Author of the publication

A nonproprietary language for the command and control of cyber defenses - OpenC2.

, and . Comput. Secur., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Impact of Quantum Computing on Present Cryptography., , , and . CoRR, (2018)Data-Driven Threat Hunting Using Sysmon., and . ICCSP, page 82-88. ACM, (2018)Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence., and . CoRR, (2021)Data-Driven Threat Hunting Using Sysmon., and . CoRR, (2021)A nonproprietary language for the command and control of cyber defenses - OpenC2., and . Comput. Secur., (2020)Towards Incident Response Orchestration and Automation for the Advanced Metering Infrastructure., , and . CoRR, (2024)PHOENI2X - A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation and Response Capabilities for Business Continuity and Recovery, Incident Response, and Information Exchange., , , , , , , , , and 8 other author(s). CoRR, (2023)Cybersecurity Playbook Sharing with STIX 2.1., and . CoRR, (2022)Enhancing the STIX Representation of MITRE ATT&CK for Group Filtering and Technique Prioritization., and . CoRR, (2022)Data Protection Impact Assessment in Identity Control Management with a Focus on Biometrics., , , and . Open Identity Summit, volume P-305 of LNI, page 185-192. Gesellschaft für Informatik e.V., (2020)