CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence Data (Englisch)
- Neue Suche nach: Riebe, Thea
- Weitere Informationen zu Riebe, Thea:
- https://orcid.org/http://orcid.org/0000-0003-3210-6734
- Neue Suche nach: Wirth, Tristan
- Weitere Informationen zu Wirth, Tristan:
- https://orcid.org/http://orcid.org/0000-0002-2445-9081
- Neue Suche nach: Bayer, Markus
- Weitere Informationen zu Bayer, Markus:
- https://orcid.org/http://orcid.org/0000-0002-2040-5609
- Neue Suche nach: Kühn, Philipp
- Weitere Informationen zu Kühn, Philipp:
- https://orcid.org/http://orcid.org/0000-0002-1739-876X
- Neue Suche nach: Kaufhold, Marc-André
- Weitere Informationen zu Kaufhold, Marc-André:
- https://orcid.org/http://orcid.org/0000-0002-0387-9597
- Neue Suche nach: Knauthe, Volker
- Weitere Informationen zu Knauthe, Volker:
- https://orcid.org/http://orcid.org/0000-0001-6993-5099
- Neue Suche nach: Guthe, Stefan
- Weitere Informationen zu Guthe, Stefan:
- https://orcid.org/http://orcid.org/0000-0001-5539-9096
- Neue Suche nach: Reuter, Christian
- Weitere Informationen zu Reuter, Christian:
- https://orcid.org/http://orcid.org/0000-0003-1920-038X
- Neue Suche nach: Gao, Debin
- Weitere Informationen zu Gao, Debin:
- https://orcid.org/https://orcid.org/0000-0001-9412-9961
- Neue Suche nach: Li, Qi
- Weitere Informationen zu Li, Qi:
- https://orcid.org/https://orcid.org/0000-0001-8776-8730
- Neue Suche nach: Guan, Xiaohong
- Neue Suche nach: Liao, Xiaofeng
- Weitere Informationen zu Liao, Xiaofeng:
- https://orcid.org/https://orcid.org/0000-0002-3566-8161
- Neue Suche nach: Riebe, Thea
- Weitere Informationen zu Riebe, Thea:
- https://orcid.org/http://orcid.org/0000-0003-3210-6734
- Neue Suche nach: Wirth, Tristan
- Weitere Informationen zu Wirth, Tristan:
- https://orcid.org/http://orcid.org/0000-0002-2445-9081
- Neue Suche nach: Bayer, Markus
- Weitere Informationen zu Bayer, Markus:
- https://orcid.org/http://orcid.org/0000-0002-2040-5609
- Neue Suche nach: Kühn, Philipp
- Weitere Informationen zu Kühn, Philipp:
- https://orcid.org/http://orcid.org/0000-0002-1739-876X
- Neue Suche nach: Kaufhold, Marc-André
- Weitere Informationen zu Kaufhold, Marc-André:
- https://orcid.org/http://orcid.org/0000-0002-0387-9597
- Neue Suche nach: Knauthe, Volker
- Weitere Informationen zu Knauthe, Volker:
- https://orcid.org/http://orcid.org/0000-0001-6993-5099
- Neue Suche nach: Guthe, Stefan
- Weitere Informationen zu Guthe, Stefan:
- https://orcid.org/http://orcid.org/0000-0001-5539-9096
- Neue Suche nach: Reuter, Christian
- Weitere Informationen zu Reuter, Christian:
- https://orcid.org/http://orcid.org/0000-0003-1920-038X
In:
Information and Communications Security
: 23rd International Conference, ICICS 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part I
;
Kapitel: 24
;
429-446
;
2021
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence Data
-
Weitere Titelangaben:Lect.Notes Computer
-
Beteiligte:Gao, Debin ( Herausgeber:in ) / Li, Qi ( Herausgeber:in ) / Guan, Xiaohong ( Herausgeber:in ) / Liao, Xiaofeng ( Herausgeber:in ) / Riebe, Thea ( Autor:in ) / Wirth, Tristan ( Autor:in ) / Bayer, Markus ( Autor:in ) / Kühn, Philipp ( Autor:in ) / Kaufhold, Marc-André ( Autor:in ) / Knauthe, Volker ( Autor:in )
-
Kongress:International Conference on Information and Communications Security ; 2021 ; Chongqing, China
-
Erschienen in:Information and Communications Security : 23rd International Conference, ICICS 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part I ; Kapitel: 24 ; 429-446Lecture Notes in Computer Science ; 12918 ; 429-446Security and Cryptology ; 429-446
-
Verlag:
- Neue Suche nach: Springer International Publishing
-
Erscheinungsort:Cham
-
Erscheinungsdatum:17.09.2021
-
Format / Umfang:18 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
The Golden Snitch: A Byzantine Fault Tolerant Protocol with ActivityLiao, Huimei / Xu, Haixia / Li, Peili et al. | 2021
- 2
-
Rectifying Administrated ERC20 TokensIvanov, Nikolay / Guo, Hanqing / Yan, Qiben et al. | 2021
- 3
-
Moat: Model Agnostic Defense against Targeted Poisoning Attacks in Federated LearningManna, Arpan / Kasyap, Harsh / Tripathy, Somanath et al. | 2021
- 4
-
Certified Malware in South Korea: A Localized Study of Breaches of Trust in Code-Signing PKI EcosystemKwon, Bumjun / Hong, Sanghyun / Jeon, Yuseok / Kim, Doowon et al. | 2021
- 5
-
GAN-Based Adversarial Patch for Malware C2 Traffic to Bypass DL DetectorWang, Junnan / Liu, Qixu / Liu, Chaoge / Yin, Jie et al. | 2021
- 6
-
Analyzing the Security of OTP 2FA in the Face of Malicious TerminalsMahdad, Ahmed Tanvir / Jubur, Mohammed / Saxena, Nitesh et al. | 2021
- 7
-
Disappeared Face: A Physical Adversarial Attack Method on Black-Box Face Detection ModelsZhou, Chuan / Jing, Huiyun / He, Xin / Wang, Liming / Chen, Kai / Ma, Duohe et al. | 2021
- 8
-
HIAWare: Speculate Handwriting on Mobile Devices with Built-In SensorsChen, Jing / Jiang, Peidong / He, Kun / Zeng, Cheng / Du, Ruiying et al. | 2021
- 9
-
Studies of Keyboard Patterns in Passwords: Recognition, Characteristics and Strength EvolutionYang, Kunyu / Hu, Xuexian / Zhang, Qihui / Wei, Jianghong / Liu, Wenfen et al. | 2021
- 10
-
CNN-Based Continuous Authentication on Smartphones with Auto Augmentation SearchDeng, Shaojiang / Luo, Jiaxing / Li, Yantao et al. | 2021
- 11
-
Generating Adversarial Point Clouds on Multi-modal Fusion Based 3D Object Detection ModelWang, Huiying / Shen, Huixin / Zhang, Boyang / Wen, Yu / Meng, Dan et al. | 2021
- 12
-
Source Identification from In-Vehicle CAN-FD Signaling: What Can We Expect?Liu, Yucheng / Li, Xiangxue et al. | 2021
- 13
-
EmuIoTNet: An Emulated IoT Network for Dynamic AnalysisSi, Qin / Cui, Lei / Li, Lun / Ding, Zhenquan / Liu, Yongji / Hao, Zhiyu et al. | 2021
- 14
-
ACGVD: Vulnerability Detection Based on Comprehensive Graph via Graph Neural Network with AttentionLi, Min / Li, Chunfang / Li, Shuailou / Wu, Yanna / Zhang, Boyang / Wen, Yu et al. | 2021
- 15
-
TranFuzz: An Ensemble Black-Box Attack Framework Based on Domain Adaptation and FuzzingLi, Hao / Guo, Shanqing / Tang, Peng / Hu, Chengyu / Chen, Zhenxiang et al. | 2021
- 16
-
Software Obfuscation with Non-Linear Mixed Boolean-Arithmetic ExpressionsLiu, Binbin / Feng, Weijie / Zheng, Qilong / Li, Jing / Xu, Dongpeng et al. | 2021
- 17
-
VIRSA: Vectorized In-Register RSA Computation with Memory Disclosure ResistanceFu, Yu / Wang, Wei / Meng, Lingjia / Wang, Qiongxiao / Zhao, Yuan / Lin, Jingqiang et al. | 2021
- 18
-
Informer: Protecting Intel SGX from Cross-Core Side Channel ThreatsLang, Fan / Wang, Wei / Meng, Lingjia / Wang, Qiongxiao / Lin, Jingqiang / Song, Li et al. | 2021
- 19
-
Towards Open World Traffic ClassificationLiu, Zhu / Cai, Lijun / Zhao, Lixin / Yu, Aimin / Meng, Dan et al. | 2021
- 20
-
Comprehensive Degree Based Key Node Recognition Method in Complex NetworksXie, Lixia / Sun, Honghong / Yang, Hongyu / Zhang, Liang et al. | 2021
- 21
-
Improving Convolutional Neural Network-Based Webshell Detection Through Reinforcement LearningWu, Yalun / Song, Minglu / Li, Yike / Tian, Yunzhe / Tong, Endong / Niu, Wenjia / Jia, Bowei / Huang, Haixiang / Li, Qiong / Liu, Jiqiang et al. | 2021
- 22
-
Exploring the Security Issues of Trusted CA Certificate ManagementFu, Yanduo / Wang, Qiongxiao / Lin, Jingqiang / Sun, Aozhuo / Lu, Linli et al. | 2021
- 23
-
Effective Anomaly Detection Model Training with only Unlabeled Data by Weakly Supervised Learning TechniquesYang, Wenzhuo / Lam, Kwok-Yan et al. | 2021
- 24
-
CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence DataRiebe, Thea / Wirth, Tristan / Bayer, Markus / Kühn, Philipp / Kaufhold, Marc-André / Knauthe, Volker / Guthe, Stefan / Reuter, Christian et al. | 2021
- 25
-
CyberRel: Joint Entity and Relation Extraction for Cybersecurity ConceptsGuo, Yongyan / Liu, Zhengyu / Huang, Cheng / Liu, Jiayong / Jing, Wangyuan / Wang, Ziwang / Wang, Yanghao et al. | 2021
- 26
-
Microblog User Location Inference Based on POI and Query Likelihood ModelLiu, Yimin / Luo, Xiangyang / Li, Han et al. | 2021