Author of the publication

Enhanced Correlation in an Intrusion Detection Process.

, , and . MMM-ACNS, volume 2776 of Lecture Notes in Computer Science, page 157-170. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Federated Learning as Enabler for Collaborative Security between not Fully-Trusting Distributed Parties., , , , and . C&ESAR, volume 3329 of CEUR Workshop Proceedings, page 65-80. CEUR-WS.org, (2022)Science Hackathons for Cyberphysical System Security Research: Putting CPS testbed platforms to good use., , , , , , , , , and . CPS-SPC@CCS, page 102-107. ACM, (2018)How Fast Does Malware Leveraging EternalBlue Propagate? The case of WannaCry and NotPetya., , , , , and . NetSoft, page 399-404. IEEE, (2024)Recognizing Malicious Intention in an Intrusion Detection Process., , , and . HIS, volume 87 of Frontiers in Artificial Intelligence and Applications, page 806-817. IOS Press, (2002)Reaction Policy Model Based on Dynamic Organizations and Threat Context., , and . DBSec, volume 5645 of Lecture Notes in Computer Science, page 49-64. Springer, (2009)Protecting On-Line Casinos against Fraudulent Player Drop-Out., , , , , , and . ITCC (1), page 500-505. IEEE Computer Society, (2005)Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation., , , , , and . ICICS, volume 3269 of Lecture Notes in Computer Science, page 223-235. Springer, (2004)SADIS: Real-Time Sound-Based Anomaly Detection for Industrial Systems., , , and . FPS (2), volume 14552 of Lecture Notes in Computer Science, page 82-92. Springer, (2023)Intent-Based Attack Mitigation through Opportunistic Synchronization of Micro-Services., , , , and . NetSoft, page 149-152. IEEE, (2024)Advanced Reaction Using Risk Assessment in Intrusion Detection Systems., , , and . CRITIS, volume 5141 of Lecture Notes in Computer Science, page 58-70. Springer, (2007)