Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing Network Intrusion Detection by Correlation of Modularly Hashed Sketches., , and . AIMS, volume 8508 of Lecture Notes in Computer Science, page 160-172. Springer, (2014)Session-level Adversary Intent-Driven Cyberattack Simulator., , , and . DS-RT, page 1-9. IEEE, (2020)Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems., , , , , , , and . Adaptive Autonomous Secure Cyber Systems, Springer, (2020)Towards a Visual Analytics Workflow for Cybersecurity Simulations., and . VISIGRAPP (3: IVAPP), page 179-186. SCITEPRESS, (2023)The Road Towards Autonomous Cybersecurity Agents: Remedies for Simulation Environments., , , and . ESORICS Workshops (2), volume 14399 of Lecture Notes in Computer Science, page 738-749. Springer, (2023)Adversary Tactic Driven Scenario and Terrain Generation with Partial Infrastructure Specification., , , , and . ARES, page 33:1-33:11. ACM, (2024)Towards Provable Network Traffic Measurement and Analysis via Semi-Labeled Trace Datasets., , , , , , and . TMA, page 1-8. IEEE, (2018)Aspect-Based Attack Detection in Large-Scale Networks., , , and . RAID, volume 6307 of Lecture Notes in Computer Science, page 488-489. Springer, (2010)Network defence strategy evaluation: Simulation vs. live network., , and . IM, page 81-88. IEEE, (2017)Initial Reference Architecture of an Intelligent Autonomous Agent for Cyber Defense., , , , , , , , , and 1 other author(s). CoRR, (2018)