Author of the publication

Automated Attacker Behaviour Classification Using Threat Intelligence Insights.

, , , , and . FPS (1), volume 14551 of Lecture Notes in Computer Science, page 285-301. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ontology-Based Anomaly Detection for Air Traffic Control Systems., , , and . CoRR, (2022)Evading Deep Reinforcement Learning-based Network Intrusion Detection with Adversarial Attacks., , , , , and . ARES, page 31:1-31:6. ACM, (2022)Notes on Generating Satisfiable SAT Instances Using Random Subgraph Isomorphism., and . Canadian AI, volume 6085 of Lecture Notes in Computer Science, page 315-318. Springer, (2010)Reinforcement Learning Based Penetration Testing of a Microgrid Control Algorithm., , , and . CCWC, page 38-44. IEEE, (2021)A Linked Data platform for mining software repositories., , , , , , and . MSR, page 32-35. IEEE Computer Society, (2012)Real-Time Defensive Strategy Selection via Deep Reinforcement Learning., , , , and . ARES, page 15:1-15:11. ACM, (2023)Automated Attacker Behaviour Classification Using Threat Intelligence Insights., , , , and . FPS (1), volume 14551 of Lecture Notes in Computer Science, page 285-301. Springer, (2023)Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection., , , , and . FPS (1), volume 14551 of Lecture Notes in Computer Science, page 53-68. Springer, (2023)A Comparison of Biology-based Metaheuristics for Finding Piecewise Linear Approximations of Digitized Soundcurves., and . GEM, page 118-122. CSREA Press, (2009)Attacker Attribution via Characteristics Inference Using Honeypot Data., , , and . NSS, volume 13787 of Lecture Notes in Computer Science, page 155-169. Springer, (2022)