Author of the publication

Recognizing Malicious Intention in an Intrusion Detection Process.

, , , and . HIS, volume 87 of Frontiers in Artificial Intelligence and Applications, page 806-817. IOS Press, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Demo: Highlighting the Limits of Federated Learning in Intrusion Detection., , and . ICDCS, page 1416-1419. IEEE, (2024)Federated Learning as Enabler for Collaborative Security between not Fully-Trusting Distributed Parties., , , , and . C&ESAR, volume 3329 of CEUR Workshop Proceedings, page 65-80. CEUR-WS.org, (2022)Science Hackathons for Cyberphysical System Security Research: Putting CPS testbed platforms to good use., , , , , , , , , and . CPS-SPC@CCS, page 102-107. ACM, (2018)Systematic Analysis of Label-flipping Attacks against Federated Learning in Collaborative Intrusion Detection Systems., , and . ARES, page 63:1-63:12. ACM, (2024)How Fast Does Malware Leveraging EternalBlue Propagate? The case of WannaCry and NotPetya., , , , , and . NetSoft, page 399-404. IEEE, (2024)Advanced Reaction Using Risk Assessment in Intrusion Detection Systems., , , and . CRITIS, volume 5141 of Lecture Notes in Computer Science, page 58-70. Springer, (2007)Enhanced Correlation in an Intrusion Detection Process., , and . MMM-ACNS, volume 2776 of Lecture Notes in Computer Science, page 157-170. Springer, (2003)Science Hackathons for Cyberphysical System Security Research: Putting CPS testbed platforms to good use., , , , , , , , , and . CoRR, (2018)The Evolution of Federated Learning-Based Intrusion Detection and Mitigation: A Survey., , , and . IEEE Trans. Netw. Serv. Manag., 19 (3): 2309-2332 (2022)Enabling Dynamic Security Policy in the Java Security Manager., , and . FPS, volume 7743 of Lecture Notes in Computer Science, page 180-193. Springer, (2012)