Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Request for a Surveillance Tower: Evasive Tactics in Cyber Defense Exercises., and . CyCon, page 239-252. IEEE, (2023)Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems., , , , , , , and . Adaptive Autonomous Secure Cyber Systems, Springer, (2020)Comparative Analysis of Pattern Mining Algorithms for Event Logs., , and . CSR, page 1-7. IEEE, (2023)Frankenstack: Real-time Cyberattack Detection and Feedback System for Technical Cyber Exercises., and . CSR, page 396-402. IEEE, (2021)LogCluster - A data clustering and pattern mining algorithm for event logs., and . CNSM, page 1-7. IEEE Computer Society, (2015)Data Quality Problem in AI-Based Network Intrusion Detection Systems Studies and a Solution Proposal., , , , and . CyCom, page 367-383. IEEE, (2022)Using Security Logs for Collecting and Reporting Technical Security Metrics., and . MILCOM, page 294-299. IEEE, (2014)Frankenstack: Toward real-time Red Team feedback., , , , and . MILCOM, page 400-405. IEEE, (2017)Event log analysis with the LogCluster tool., , and . MILCOM, page 982-987. IEEE, (2016)Initial Reference Architecture of an Intelligent Autonomous Agent for Cyber Defense., , , , , , , , , and 1 other author(s). CoRR, (2018)