From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Enabling exercises, education and research with a comprehensive cyber range., , , , , , , , , и 2 other автор(ы). J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 12 (4): 37-61 (2021)A Framework for Cyber Threat Intelligence Extraction from Raw Log Data., , , , и . IEEE BigData, стр. 3200-3209. IEEE, (2019)Have it Your Way: Generating Customized Log Datasets With a Model-Driven Simulation Testbed., , , , и . IEEE Trans. Reliab., 70 (1): 402-415 (2021)Maintainable Log Datasets for Evaluation of Intrusion Detection Systems., , , , , и . CoRR, (2022)Have It Your Way: Generating Customized Log Data Sets with a Model-driven Simulation Testbed., , , , и . QRS, стр. 52. IEEE, (2020)Kyoushi Testbed Environment: A Model-driven Simulation Framework to Generate Open Log Data Sets for Security Evaluations., , , и . ERCIM News, 2022 (129): 0 (2022)Maintainable Log Datasets for Evaluation of Intrusion Detection Systems., , , , , и . IEEE Trans. Dependable Secur. Comput., 20 (4): 3466-3482 (июля 2023)A Framework for Automatic Labeling of Log Datasets from Model-driven Testbeds for HIDS Evaluation., , , , , и . SAT-CPS@CODASPY, стр. 77-86. ACM, (2022)AIT Cyber Range: Flexible Cyber Security Environment for Exercises, Training and Research., , , , , , , , , и . EICC, стр. 2:1-2:6. ACM, (2020)