Author of the publication

Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process.

, , , , and . ICISSP, page 211-218. SCITEPRESS, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Standing Still Is Not an Option: Alternative Baselines for Attainable Utility Preservation., , and . CD-MAKE, volume 14065 of Lecture Notes in Computer Science, page 239-257. Springer, (2023)Anomaly Detection Support Using Process Classification., , and . ICSSA, page 27-40. IEEE, (2019)PenQuest Reloaded: A Digital Cyber Defense Game for Technical Education., , , , , , and . EDUCON, page 906-914. IEEE, (2022)PenQuest: Gamifying Cyberattacks., and . ERCIM News, 2022 (129): 0 (2022)Anomaly Detection Support Using Process Classification., , and . CoRR, (2021)A Game Theoretic Analysis of Cyber Threats., , and . ICISSP, page 706-713. SciTePress, (2023)Bridging the Gap: Conceptual Modeling and Machine Learning for Web Portals., , , and . ER (Workshops), volume 14319 of Lecture Notes in Computer Science, page 107-116. Springer, (2023)Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process., , , , and . ICISSP, page 211-218. SCITEPRESS, (2024)Formalizing Real-world Threat Scenarios., , and . ICISSP, page 281-289. SCITEPRESS, (2022)Self-propagating Malware Containment via Reinforcement Learning., and . CD-MAKE, volume 12844 of Lecture Notes in Computer Science, page 35-50. Springer, (2021)