Author of the publication

Search-based test and improvement of machine-learning-based anomaly detection systems.

, , , and . ISSTA, page 158-168. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Risk Analyses and Dependency-Aware Root Cause Model for Critical Infrastructures., , , , , and . CRITIS, volume 10242 of Lecture Notes in Computer Science, page 163-175. Springer, (2016)Characterization of high-resolution liquid crystal displays for medical images., , , , , , , and . Medical Imaging: Image-Guided Procedures, volume 4681 of SPIE Proceedings, SPIE, (2002)Risk monitoring with intrusion detection for industrial control systems. (Surveillance des risques avec détection d'intrusion pour les systèmes de contrôle industriels).. École nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, France, (2018)Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees., , , , and . GraMSec@CSF, volume 9987 of Lecture Notes in Computer Science, page 80-93. Springer, (2016)Search-based test and improvement of machine-learning-based anomaly detection systems., , , and . ISSTA, page 158-168. ACM, (2019)Three Digital Mammography Display Configurations: Observer Performance in a Pilot ROC Study., , , , , , , , , and 1 other author(s). Digital Mammography / IWDM, volume 6136 of Lecture Notes in Computer Science, page 280-287. Springer, (2010)A training-resistant anomaly detection system., , , , , and . Comput. Secur., (2018)Fast and Optimal Countermeasure Selection for Attack Defence Trees., , and . RISK, volume 10224 of Lecture Notes in Computer Science, page 53-65. (2016)Efficiently computing the likelihoods of cyclically interdependent risk scenarios., , , , and . Comput. Secur., (2017)