Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data-Driven Threat Hunting Using Sysmon., and . ICCSP, page 82-88. ACM, (2018)A Framework for Data-Driven Physical Security and Insider Threat Detection., , and . ASONAM, page 1108-1115. IEEE Computer Society, (2018)Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence., and . EISIC, page 91-98. IEEE Computer Society, (2017)Neural reputation models learned from passive DNS data., and . IEEE BigData, page 3662-3671. IEEE Computer Society, (2017)Data Protection Impact Assessment in Identity Control Management with a Focus on Biometrics., , , and . Open Identity Summit, volume P-305 of LNI, page 185-192. Gesellschaft für Informatik e.V., (2020)FormAI Dataset: A Large Collection of AI-Generated C Programs and Their Vulnerability Classifications., , , , , and . (September 2023)Towards Incident Response Orchestration and Automation for the Advanced Metering Infrastructure., , and . WFCS, page 1-8. IEEE, (2024)Firearm Detection via Convolutional Neural Networks: Comparing a Semantic Segmentation Model Against End-to-End Solutions., , and . IEEE BigData, page 1796-1804. IEEE, (2020)Quick Response Code Secure: A Cryptographically Secure Anti-Phishing Tool for QR Code Attacks., and . MMM-ACNS, volume 10446 of Lecture Notes in Computer Science, page 313-324. Springer, (2017)Firearm Detection and Segmentation Using an Ensemble of Semantic Neural Networks., , , and . CoRR, (2020)