Skip to Main Content

Hilti Lehrstuhl für Daten- und Anwendungssicherheit

Team

Detection of illicit cryptomining using network metadata

The Cross-Evaluation of Machine Learning-based Network Intrusion Detection Systems

Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems

Referenz

Apruzzese, G., Andreolini, M., Ferretti, L., Marchetti, M., & Colajanni, M. (2022). Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems. Digital Threats: Research and Practice, 3(3).

Publication Type

Beitrag in wissenschaftlicher Fachzeitschrift

On the Evaluation of Sequential Machine Learning for Network Intrusion Detection

Referenz

Corsini, A., Yang, S. J., & Apruzzese, G. (2021). On the Evaluation of Sequential Machine Learning for Network Intrusion Detection. Paper presented at the 16th International Conference on Availability, Reliability and Security, Vienna, Austria.

Publication Type

Beitrag in Konferenztagungsband

Bringing order to approximate matching: Classification and attacks on similarity digest algorithms

Referenz

Martín-Pérez, M., Rodríguez, R., & Breitinger, F. (2021). Bringing order to approximate matching: Classification and attacks on similarity digest algorithms. Forensic Science International: Digital Investigation, 36(301120).

Publication Type

Beitrag in wissenschaftlicher Fachzeitschrift

Towards an Efficient Detection of Pivoting Activity

Hilti Lehrstuhl für Daten- und Anwendungssicherheit abonnieren