Author of the publication

Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection.

, , , and . NDSS, The Internet Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals., , , , and . CoRR, (2021)Information Security Threats and Working from Home Culture: Taxonomy, Risk Assessment and Solutions., , , , and . Sensors, 23 (8): 4018 (2023)Detection of Malicious and Low Throughput Data Exfiltration Over the DNS Protocol., , and . CoRR, (2017)SoK - Security and Privacy in the Age of Drones: Threats, Challenges, Solution Mechanisms, and Scientific Gaps., , , and . CoRR, (2019)Detecting Computers in Cyber Space Maliciously Exploited as SSH Proxies., and . SECITC, volume 9522 of Lecture Notes in Computer Science, page 201-211. Springer, (2015)On the Security of MIL-STD-1553 Communication Bus., , , and . ISSA/CSITS@ESORICS, volume 11552 of Lecture Notes in Computer Science, page 153-171. Springer, (2018)IP2User - Identifying the Username of an IP Address in Network-Related Events., , , , , , , and . BigData Congress, page 435-436. IEEE Computer Society, (2013)Improving malware detection by applying multi-inducer ensemble., , , and . Comput. Stat. Data Anal., 53 (4): 1483-1494 (2009)Vesper: Using Echo Analysis to Detect Man-in-the-Middle Attacks in LANs., , , and . IEEE Trans. Inf. Forensics Secur., 14 (6): 1638-1653 (2019)Design Procedure of Knowledge Base for Practical Attack Graph Generation., , , , , , , and . AsiaCCS, page 594-601. ACM, (2019)