Author of the publication

Discovering Correlations: A Formal Definition of Causal Dependency Among Heterogeneous Events.

, , and . EuroS&P, page 340-355. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sec2graph: Network Attack Detection Based on Novelty Detection on Graph Structured Data., , , and . DIMVA, volume 12223 of Lecture Notes in Computer Science, page 238-258. Springer, (2020)Discovering Correlations: A Formal Definition of Causal Dependency Among Heterogeneous Events., , and . EuroS&P, page 340-355. IEEE, (2019)Errors in the CICIDS2017 Dataset and the Significant Differences in Detection Performances It Makes., , , , , and . CRiSIS, volume 13857 of Lecture Notes in Computer Science, page 18-33. Springer, (2022)Towards Understanding Alerts raised by Unsupervised Network Intrusion Detection Systems., , , , , and . RAID, page 135-150. ACM, (2023)Forensic Analysis of Network Attacks: Restructuring Security Events as Graphs and Identifying Strongly Connected Sub-graphs., , , and . EuroS&P Workshops, page 565-573. IEEE, (2020)COTS Diversity Based Intrusion Detection and Application to Web Servers., , and . RAID, volume 3858 of Lecture Notes in Computer Science, page 43-62. Springer, (2005)STARLORD: Linked security data exploration in a 3D graph., , , and . VizSEC, page 1-4. IEEE Computer Society, (2017)Program Transformation for Non-interference Verification on Programs with Pointers., , , and . SEC, volume 405 of IFIP Advances in Information and Communication Technology, page 231-244. Springer, (2013)DAEMON: Dynamic Auto-encoders for Contextualised Anomaly Detection Applied to Security MONitoring., , and . SEC, volume 648 of IFIP Advances in Information and Communication Technology, page 53-69. Springer, (2022)An Efficient and Scalable Intrusion Detection System on Logs of Distributed Applications., , , and . SEC, volume 562 of IFIP Advances in Information and Communication Technology, page 49-63. Springer, (2019)