Hierarchical object log format for normalisation of security events A Sapegin, D Jaeger, A Azodi, M Gawron, F Cheng, C Meinel 2013 9th international conference on information assurance and security (IAS …, 2013 | 40 | 2013 |
Automatic vulnerability classification using machine learning M Gawron, F Cheng, C Meinel Risks and Security of Internet and Systems: 12th International Conference …, 2018 | 27 | 2018 |
Poisson-based anomaly detection for identifying malicious user behaviour A Sapegin, A Amirkhanyan, M Gawron, F Cheng, C Meinel Mobile, Secure, and Programmable Networking: First International Conference …, 2015 | 15 | 2015 |
Positionspapier: Suchtmedizinische und gesundheitspolitische Chancen und Risiken durch den Gebrauch von E-Zigaretten T Rüther, M Backmund, G Bischof, N Lange, P Missel, U Preuß, HJ Rumpf, ... Suchttherapie 18 (03), 120-123, 2017 | 14 | 2017 |
Simulation user behavior on a security testbed using user behavior states graph A Amirkhanyan, A Sapegin, M Gawron, F Cheng, C Meinel Proceedings of the 8th International Conference on Security of Information …, 2015 | 11 | 2015 |
PVD: Passive vulnerability detection M Gawron, F Cheng, C Meinel 2017 8th International Conference on Information and Communication Systems …, 2017 | 10 | 2017 |
Evaluation of in‐memory storage engine for machine learning analysis of security events A Sapegin, M Gawron, D Jaeger, F Cheng, C Meinel Concurrency and Computation: Practice and Experience 29 (2), e3800, 2017 | 9 | 2017 |
High-speed security analytics powered by in-memory machine learning engine A Sapegin, M Gawron, D Jaeger, F Cheng, C Meinel 2015 14th International Symposium on Parallel and Distributed Computing, 74-81, 2015 | 9 | 2015 |
Automatic vulnerability detection for weakness visualization and advisory creation M Gawron, A Amirkhanyan, F Cheng, C Meinel Proceedings of the 8th International Conference on Security of Information …, 2015 | 8 | 2015 |
Automatic detection of vulnerabilities for advanced security analytics M Gawron, F Cheng, C Meinel 2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS …, 2015 | 7 | 2015 |
CGA integration into IPsec/IKEv2 authentication A Alsa'deh, C Meinel, F Westphal, M Gawron, B Groneberg Proceedings of the 6th International Conference on Security of Information …, 2013 | 6 | 2013 |
Normalisation of log messages for intrusion detection A Sapegin, D Jaeger, A Azodi, M Gawron, F Cheng, C Meinel Journal of Information Assurance and Security 9 (3), 167-176, 2014 | 4 | 2014 |
Analyzing boundary device logs on the in-memory platform F Cheng, A Sapegin, M Gawron, C Meinel 2015 IEEE 17th International Conference on High Performance Computing and …, 2015 | 3 | 2015 |
Leveraging event structure for adaptive machine learning on big data landscapes A Azodi, M Gawron, A Sapegin, F Cheng, C Meinel Mobile, Secure, and Programmable Networking: First International Conference …, 2015 | 3 | 2015 |
Towards automated advanced vulnerability analysis M Gawron Universität Potsdam, 2019 | | 2019 |
HPI Future SOC Lab: Proceedings 2015 K Kurbel, D Nowak, A Azodi, D Jaeger, C Meinel, F Cheng, A Sapegin, ... | | 2015 |
HPI Vulnerability Database: Integration and Analytics of Vulnerability Information M Gawron, A Sapegin, F Cheng, C Meinel HPI Future SOC Lab: Proceedings 2014, 39, 0 | | |