Author of the publication

Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process.

, , , , and . ICISSP, page 211-218. SCITEPRESS, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Longkit - A Universal Framework for BIOS/UEFI Rootkits in System Management Mode., , and . ICISSP, page 346-353. SciTePress, (2017)TAON: an ontology-based approach to mitigating targeted attacks., , and . iiWAS, page 303-312. ACM, (2016)Classifying malicious system behavior using event propagation trees., , , and . iiWAS, page 23:1-23:10. ACM, (2015)Advanced threat intelligence: detection and classification of anomalous behavior in system processes., and . Elektrotech. Informationstechnik, 137 (1): 38-44 (2020)Advanced threat intelligence: interpretation of anomalous behavior in ubiquitous kernel processes.. De Montfort University, Leicester, UK, (2019)British Library, EThOS.Sequitur-based Inference and Analysis Framework for Malicious System Behavior., , , and . ICISSP, page 632-643. SciTePress, (2017)The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns., , , , , , and . ARES, page 18:1-18:10. ACM, (2018)LLR-Based Sentiment Analysis for Kernel Event Sequences., , and . AINA, page 764-771. IEEE Computer Society, (2017)Empirical Malware Research through Observation of System Behaviour., , , and . WWW (Companion Volume), page 467-469. ACM, (2016)Endpoint Data Classification Using Markov Chains., , and . ICSSA, page 56-59. IEEE, (2017)