Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Florian Gottwalt"'
Publikováno v:
Big Data and Cognitive Computing, Vol 4, Iss 3, p 23 (2020)
Compliance management for procurement internal auditing has been a major challenge for public sectors due to its tedious period of manual audit history and large-scale paper-based repositories. Many practical issues and potential risks arise during t
Externí odkaz:
https://doaj.org/article/9501465012c3427aa9a96f35fa07a94f
Publikováno v:
ACM Computing Surveys. 55:1-36
Traditional Intrusion Detection Systems (IDS) cannot cope with the increasing number and sophistication of cyberattacks such as Advanced Persistent Threats (APT) . Due to their high false-positive rate and the required effort of security experts to v
A Conceptual Framework for Automated Rule Generation in Provenance-based Intrusion Detection Systems
Publikováno v:
2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech).
Autor:
Thien Bui-Nguyen, Stuart Green, Florian Gottwalt, Elizabeth Chang, Michael Zipperle, Marius Becherer
Publikováno v:
A Framework of Human Systems Engineering
Publikováno v:
Futuristic Communication and Network Technologies ISBN: 9789811646249
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e554d61e04183bc7ffe74febc2eee2dd
https://doi.org/10.1007/978-981-16-4625-6_104
https://doi.org/10.1007/978-981-16-4625-6_104
Publikováno v:
Computers & Security. 83:234-245
Recent research on network intrusion detection has focused on correlation-based techniques, which allow one to adapt to continuously changing environments such as the Internet of Things. Despite it being common practice for network intrusion detectio
Publikováno v:
Journal of Informetrics. 13:616-634
© 2019 Elsevier Ltd. All rights reserved. As the volume of scientific articles has grown rapidly over the last decades, evaluating their impact becomes critical for tracing valuable and significant research output. Many studies have proposed various
One promising method to detect cyber-crime is anomaly detection, which enables one to detect new, unseen attacks. Despite this ability, anomaly detection methods only have limited utilization in practice, due to the high number of false alarms genera
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::819e29b8e4fd40ec0b7d400124561b20
https://doi.org/10.4018/978-1-7998-5728-0.ch009
https://doi.org/10.4018/978-1-7998-5728-0.ch009
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783319987750
Although the application of feature selection techniques is common practice for performance enhancements of network anomaly detection techniques, it has rarely been used for recently proposed multivariate correlation-based methods. This paper investi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::17cce7fa8b779a2490f27ed911a344ec
https://doi.org/10.1007/978-3-319-98776-7_2
https://doi.org/10.1007/978-3-319-98776-7_2
Autor:
Florian Gottwalt, Achim P. Karduck
Publikováno v:
Information Innovation Technology in Smart Cities ISBN: 9789811017407
In order to make our envisioned Smart Cities become reality one day, it is essential that confidentiality, integrity and availability of all assets within the digital ecosystem can be ensured at any time. The challenges to secure such complex and hig
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a73b36e139e3ee03fa98fae334e78bc5
https://doi.org/10.1007/978-981-10-1741-4_13
https://doi.org/10.1007/978-981-10-1741-4_13