Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Kidmose, Egon"'
The European adoption of smart electricity meters triggers the developments of new value-added service for smart energy and optimal consumption. Recently, several algorithms and tools have been built to analyze smart meter's data. This paper introduc
Externí odkaz:
http://arxiv.org/abs/1807.03111
Autor:
Anagnostopoulos, Marios, Kidmose, Egon, Laghaout, Amine, Olsen, Rasmus L., Homayoun, Sajad, Jensen, Christian D., Pedersen, Jens Myrup
Publikováno v:
Anagnostopoulos, M, Kidmose, E, Laghaout, A, Olsen, R L, Homayoun, S, Jensen, C D & Pedersen, J M 2022, An architecture for processing a dynamic heterogeneous information network of security intelligence . in Proceedings of 15 th International Conference on Network and System Security . IEEE, pp. 185–201, 15 th International Conference on Network and System Security, Tianjin, China, 23/10/2021 . https://doi.org/10.1007/978-3-030-92708-0_11
Security intelligence is widely used to solve cyber security issues in computer and network systems, such as incident prevention, detection, and response, by applying machine learning (ML) and other data-driven methods. To this end, there is a large
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1202::9f2101d99b0d841226161903e54e6895
https://orbit.dtu.dk/en/publications/6e81674f-8353-4f00-98d4-595bb69adc8f
https://orbit.dtu.dk/en/publications/6e81674f-8353-4f00-98d4-595bb69adc8f
Autor:
Anagnostopoulos, Marios, Kidmose, Egon, Laghaout, Amine, Olsen, Rasmus L., Homayoun, Sajad, Jensen, Christian D., Pedersen, Jens M.
Publikováno v:
Anagnostopoulos, M, Kidmose, E, Laghaout, A, Olsen, R L, Homayoun, S, Jensen, C D & Pedersen, J M 2021, An Architecture for Processing a Dynamic Heterogeneous Information Network of Security Intelligence . in M Yang, C Chen & Y Liu (eds), Network and System Security : 15th International Conference, NSS 2021, Tianjin, China, October 23, 2021, Proceedings . Springer, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 13041 LNCS, pp. 185-201, 15th International Conference on Network and System Security, NSS 2021, Tianjin, China, 23/10/2021 . https://doi.org/10.1007/978-3-030-92708-0_11
Security intelligence is widely used to solve cyber security issues in computer and network systems, such as incident prevention, detection, and response, by applying machine learning (ML) and other data-driven methods. To this end, there is a large
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::433a44e231bbec06dcee548e1575d49c
https://vbn.aau.dk/ws/files/474564195/secdns_architecture_paper.pdf
https://vbn.aau.dk/ws/files/474564195/secdns_architecture_paper.pdf
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Kidmose, Egon
Publikováno v:
Kidmose, E 2019, Network-based detection of malicious activities-a corporate network perspective . Ph.d.-serien for Det Tekniske Fakultet for IT og Design, Aalborg Universitet, Aalborg Universitetsforlag . https://doi.org/10.54337/aau300041111
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::8b8621514eae0cb00fdc794fb5df7af0
https://vbn.aau.dk/da/publications/694daea6-e332-4346-9312-1aa38dca250f
https://vbn.aau.dk/da/publications/694daea6-e332-4346-9312-1aa38dca250f
Autor:
Mahmoud, Rasmi-Vlad, Kidmose, Egon, Broholm, Rasmus, Pilawka, Olga Paulina, Illés, Dominika, Magnussen, Rikke, Pedersen, Jens Myrup
Publikováno v:
Proceedings of the European Conference on Games Based Learning; 2020, p364-371, 8p
Publikováno v:
Kidmose, E, Gausel, K, Brandbyge, S & Pedersen, J M 2018, Assessing usefulness of blacklists without the ground truth . in Image Processing and Communications Challenges 10 . Springer, Advances in Intelligent Systems and Computing, vol. 892, pp. 216-223, 10th International Conference on Image Processing & Communications, Bydgoszcz, Poland, 14/11/2018 . https://doi.org/10.1007/978-3-030-03658-4_26
Domain name blacklists are used to detect malicious activity on the Internet. Unfortunately, no set of blacklists is known to encompass all malicious domains, reflecting an ongoing struggle for defenders to keep up with attackers, who are often motiv
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::fe2d1ea55639a7b5cb1ee0b740cc5213
https://vbn.aau.dk/da/publications/449d9f2a-6c19-4153-a542-159db4cf87cd
https://vbn.aau.dk/da/publications/449d9f2a-6c19-4153-a542-159db4cf87cd
Autor:
Pedersen, Jens Myrup, Kidmose, Egon
Publikováno v:
Pedersen, J M & Kidmose, E 2018, ' Security in internet of things : Trends and challenges ', CEUR Workshop Proceedings, vol. 2218, pp. 182–188 .
Internet of Things describes an Internet consisting not only of computers, but a large variety of smaller and larger devices including sensors, devices in industrial settings and the many smart appliances that surrounds us – from smart watches to w
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::8eccbcfb81ed5ce2c2b88c85aece627d
https://vbn.aau.dk/da/publications/bc262bb3-bc05-479c-b4a8-c004341abe97
https://vbn.aau.dk/da/publications/bc262bb3-bc05-479c-b4a8-c004341abe97
Publikováno v:
2016 International Conference On Cyber Security & Protection Of Digital Services (Cyber Security); 2016, p1-8, 8p