Cited By
View all- Schrötter MNiemann ASchnor B(2024)A Comparison of Neural-Network-Based Intrusion Detection against Signature-Based Detection in IoT NetworksInformation10.3390/info1503016415:3(164)Online publication date: 14-Mar-2024
- Tsingenopoulos ICortellazzi JBošanský BAonzo SPreuveneers DJoosen WPierazzi FCavallaro L(2024)How to Train your Antivirus: RL-based Hardening through the Problem SpaceProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3678912(130-146)Online publication date: 30-Sep-2024
- Toslali MSnible EChen JCha ASingh SKalantar MParthasarathy Sd'Amorim M(2024)AgraBOT: Accelerating Third-Party Security Risk Management in Enterprise Setting through Generative AICompanion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering10.1145/3663529.3663829(74-79)Online publication date: 10-Jul-2024
- Show More Cited By