Autor der Publikation

AlertSets: Supporting Exploratory Analysis of Cybersecurity Alerts Through Set Interactions

, , , , und . Proceedings of the 20th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, Seite 776-787. WithSecure Corporation, SCITEPRESS - Science and Technology Publications, (2025)
DOI: 10.5220/0013376800003912

Bitte wählen Sie eine Person um die Publikation zuzuordnen

Um zwischen Personen mit demselben Namen zu unterscheiden, wird der akademische Grad und der Titel einer wichtigen Publikation angezeigt. Zudem lassen sich über den Button neben dem Namen einige der Person bereits zugeordnete Publikationen anzeigen.

 

Weitere Publikationen von Autoren mit dem selben Namen

AlertSets: Supporting Exploratory Analysis of Cybersecurity Alerts through Sets, , , und . (2024)AlertSets: Supporting Exploratory Analysis of Cybersecurity Alerts Through Set Interactions, , , , und . Proceedings of the 20th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, Seite 776-787. WithSecure Corporation, SCITEPRESS - Science and Technology Publications, (2025)Locally Diverse Constellations from the Special Orthogonal Group., und . CoRR, (2015)A Low-Complexity Message Recovery Method for Compute-and-Forward Relaying., , , , und . CoRR, (2015)Private Information Retrieval from Coded Storage Systems with Colluding, Byzantine, and Unresponsive Servers., , , , und . CoRR, (2018)Nested Lattice Codes for Vector Perturbation Systems., , , und . CoRR, (2016)Algebraic Codes and a New Physical Layer Transmission Protocol for Wireless Distributed Storage Systems., , , und . CoRR, (2014)Reduced Complexity Decoding of n x n Algebraic Space-Time Codes., , und . CoRR, (2015)Perfect Secrecy in Physical-Layer Network Coding Systems From Structured Interference., und . IEEE Trans. Information Forensics and Security, 11 (8): 1875-1887 (2016)Well-rounded lattices for coset coding in MIMO wiretap channels., , , , , und . ITNAC, Seite 289-294. IEEE Computer Society, (2016)