has been cited by the following article(s):
[1]
|
Towards designing effective visualizations for DNS-based network threat analysis
|
|
2017 |
|
|
[2]
|
A framework for the evaluation of the theoretical threat coverage provided by intrusion detection systems
|
|
2017 |
|
|
[3]
|
1Department of Computer Science and Biomedical Informatics, University of Central Greece, 2-4 Papasiopoulou St., Lamia, GR-35100, Greece, e-mail …
|
|
2016 |
|
|
[4]
|
1Department of Computer Science and Biomedical Informatics, University of Central Greece, 2-4 Papasiopoulou St., Lamia, GR-35100, Greece, e-mail: …
|
|
2016 |
|
|
[5]
|
Designing a Data Cube for NSL-KDD data set to improve the quality of network intrusion detection
|
|
Proceedings of ICFM 2015, International Conference on Frontiers in Mathematics,
2015 |
|
|
[6]
|
Integration of external data sources with cyber security data warehouse
|
|
Proceedings of the 9th Annual Cyber and Information Security Research Conference,
2014 |
|
|
[7]
|
The state of the art in intrusion prevention and detection
|
|
2014 |
|
|
[8]
|
Statistically significant relational data mining
|
|
2014 |
|
|
[9]
|
Data warehouse for event streams violating rules
|
|
Foundations of Computing and Decision Sciences,
2013 |
|
|
[10]
|
Statement of Research and Teaching Interests
|
|
NULL
2013 |
|
|
[11]
|
Improving the results of intrusion detection systems
|
|
2013 |
|
|
[12]
|
Deriving behavior primitives from aggregate network features using support vector machines
|
|
Cyber Conflict (CyCon), 2013 5th International Conference on. IEEE,
2013 |
|
|
[13]
|
Addressing the challenges of anomaly detection for cyber physical energy grid systems
|
|
Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop,
2013 |
|
|
[14]
|
Methods for post-processing of alerts in intrusion detection: A survey
|
|
International Journal of Information Security Science,
2013 |
|
|
[15]
|
A combined discriminative and generative behavior model for cyber physical system defense
|
|
Resilient Control Systems (ISRCS), 2013 6th International Symposium on,
2013 |
|
|
[1]
|
Towards designing effective visualizations for DNS-based network threat analysis
2017 IEEE Symposium on Visualization for Cyber Security (VizSec),
2017
DOI:10.1109/VIZSEC.2017.8062201
|
|
|
[2]
|
A framework for the evaluation of the theoretical threat coverage provided by intrusion detection systems
2017 Military Communications and Information Systems Conference (MilCIS),
2017
DOI:10.1109/MilCIS.2017.8188557
|
|
|
[3]
|
The State of the Art in Intrusion Prevention and Detection
2014
DOI:10.1201/b16390-23
|
|
|
[4]
|
A combined discriminative and generative behavior model for cyber physical system defense
2013 6th International Symposium on Resilient Control Systems (ISRCS),
2013
DOI:10.1109/ISRCS.2013.6623767
|
|
|