Author of the publication

On Benchmarking Intrusion Detection Systems in Virtualized Environments

, , , , and . Technical Report SPEC-RG-2013-002 v.1.0, SPEC Research Group - IDS Benchmarking Working Group, Standard Performance Evaluation Corporation (SPEC), 7001 Heritage Village Plaza Suite 225, Gainesville, VA 20155, USA, (June 2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HInjector: Injecting Hypercall Attacks for Evaluating VMI-based Intrusion Detection Systems, , , , and . The 2013 Annual Computer Security Applications Conference (ACSAC 2013), Maryland, USA, Applied Computer Security Associates (ACSA), (March 2013)On Applying FMEA to SOAs: A Proposal and Open Challenges., , and . SERENE, volume 8785 of Lecture Notes in Computer Science, page 86-100. Springer, (2014)OIDC-TCI: OIDC with Trust Context Information., , and . WMNC, page 54-61. IEEE, (2022)The Impact of Data Preparation on the Fairness of Software Systems., , and . ISSRE, page 391-401. IEEE, (2019)Software Testing Strategies for Detecting Hypercall Handlers' Aging-related Bugs., , , , , and . ISSRE Workshops, page 48-55. IEEE, (2021)Towards a Robustness Assessment Methodology for IoT Systems., , and . LADC, page 1-4. IEEE, (2021)Evaluating and Improving Penetration Testing in Web Services., and . ISSRE, page 201-210. IEEE Computer Society, (2012)Using NLP and Machine Learning to Detect Data Privacy Violations., , , , and . INFOCOM Workshops, page 972-977. IEEE, (2020)Experimenting Machine Learning Techniques to Predict Vulnerabilities., , and . LADC, page 151-156. IEEE Computer Society, (2016)A Model-Based Approach to Anomaly Detection Trading Detection Time and False Alarm Rate., , , , and . MedComNet, page 1-8. IEEE, (2020)