Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DAReing to reduce the annotation overheads of verified programs., , and . CoRR, (2017)CBAM: A Contextual Model for Network Anomaly Detection., , and . Comput., 10 (6): 79 (2021)Towards data-driven autonomous cyber defence for military unmanned vehicles - threats & attacks., , , and . MILCOM, page 861-866. IEEE, (2022)Towards XAI in the SOC - a user centric study of explainable alerts with SHAP and LIME., and . IEEE Big Data, page 2595-2600. IEEE, (2022)Better Anomaly Detection for Access Attacks Using Deep Bidirectional LSTMs., , , and . MLN, volume 12629 of Lecture Notes in Computer Science, page 1-18. Springer, (2020)Towards Privacy-First Security Enablers for 6G Networks: The PRIVATEER Approach., , , , , , , , , and 15 other author(s). SAMOS, volume 14385 of Lecture Notes in Computer Science, page 379-391. Springer, (2023)Challenges for Risk and Security Modelling in Enterprise Architecture., , and . PoEM, volume 369 of Lecture Notes in Business Information Processing, page 215-225. Springer, (2019)LADEMU: a modular & continuous approach for generating labelled APT datasets from emulations., , , , and . IEEE Big Data, page 2610-2619. IEEE, (2022)On the Use of Neurosymbolic AI for Defending Against Cyber Attacks., , , , , and . NeSy (1), volume 14979 of Lecture Notes in Computer Science, page 119-140. Springer, (2024)