Author of the publication

SoK: A Comparison of Autonomous Penetration Testing Agents.

, and . ARES, page 41:1-41:10. ACM, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Advances in Computer Assisted Image Interpretation., and . Informatica (Slovenia), (1998)Multi-agent System for APT Detection., and . ISSRE Workshops, page 401-406. IEEE Computer Society, (2014)A comparative analysis of visualisation techniques to achieve cyber situational awareness in the military., , , , , , and . ICMCIS, page 1-7. IEEE, (2018)Graph-based APT detection., , and . ICMCIS, page 1-8. IEEE, (2018)Training a multi-criteria decision system and application to the detection of PHP webshells., , and . ICMCIS, page 1-8. IEEE, (2019)Detect & Reject for Transferability of Black-Box Adversarial Attacks Against Network Intrusion Detection Systems., , , , and . ACeS, volume 1487 of Communications in Computer and Information Science, page 329-339. Springer, (2021)Risk management in coalition networks.. IAS, page 329-336. IEEE Computer Society, (2007)An attempt at defining cyberdefense situation awareness in the context of command & control., and . ICMCIS, page 1-9. IEEE, (2015)Virtual Language Framework (VLF) - A Semantic Abstraction Layer., and . WEBIST, page 393-398. INSTICC Press, (2009)Leveraging Cyber Ranges for Prototyping, Certification and Training: The ECHO case., , , , , , , , , and 4 other author(s). CSR, page 299-304. IEEE, (2022)