Author of the publication

Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process.

, , , , and . ICISSP, page 211-218. SCITEPRESS, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Standing Still Is Not an Option: Alternative Baselines for Attainable Utility Preservation., , and . CD-MAKE, volume 14065 of Lecture Notes in Computer Science, page 239-257. Springer, (2023)Anomaly Detection Support Using Process Classification., , and . ICSSA, page 27-40. IEEE, (2019)PenQuest Reloaded: A Digital Cyber Defense Game for Technical Education., , , , , , and . EDUCON, page 906-914. IEEE, (2022)The Evolution of Process Hiding Techniques in Malware - Current Threats and Possible Countermeasures., , and . J. Inf. Process., (2017)Towards Resilient Artificial Intelligence: Survey and Research Issues., , , , , , , , and . CSR, page 536-542. IEEE, (2021)On the Impact of Kernel Code Vulnerabilities in IoT Devices., , and . ICSSA, page 1-5. IEEE, (2017)PenQuest: Gamifying Cyberattacks., and . ERCIM News, 2022 (129): 0 (2022)Anomaly Detection Support Using Process Classification., , and . CoRR, (2021)A Game Theoretic Analysis of Cyber Threats., , and . ICISSP, page 706-713. SciTePress, (2023)Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process., , , , and . ICISSP, page 211-218. SCITEPRESS, (2024)