User profiles for Tanja Zseby

Tanja Zseby

TU Wien
Verified email at tuwien.ac.at
Cited by 3629

Analysis of network traffic features for anomaly detection

F Iglesias, T Zseby - Machine Learning, 2015 - Springer
Anomaly detection in communication networks provides the basis for the uncovering of
novel attacks, misconfigurations and network failures. Resource constraints for data storage, …

[HTML][HTML] Requirements for IP flow information export (IPFIX)

J Quittek, T Zseby, B Claise, S Zander - 2004 - rfc-editor.org
ZsebyTanja Zseby … EMail: zseby@fokus.fhg.de …

[HTML][HTML] Anomaly detection in streaming data: A comparison and evaluation study

FI Vázquez, A Hartl, T Zseby, A Zimek - Expert Systems with Applications, 2023 - Elsevier
The detection of anomalies in streaming data faces complexities that make traditional static
methods unsuitable due to computational costs and nonstationarity. We test and evaluate …

Cyber attack models for smart grid environments

P Eder-Neuhauser, T Zseby, J Fabini… - Sustainable Energy, Grids …, 2017 - Elsevier
Smart grids utilize communication technologies that make them vulnerable to cyber attacks.
Because the power grid is a critical infrastructure, it is a tempting target for sophisticated and …

[HTML][HTML] Sampling and filtering techniques for IP packet selection

T Zseby, M Molina, N Duffield, S Niccolini, F Raspall - 2009 - rfc-editor.org
ZsebyZseby, "Stratification Strategies for Sampling-based … Tanja Zseby

Explainability and adversarial robustness for rnns

…, M Bachl, J Fabini, T Zseby - 2020 IEEE Sixth …, 2020 - ieeexplore.ieee.org
Recurrent Neural Networks (RNNs) yield attractive properties for constructing Intrusion
Detection Systems (IDSs) for network data. With the rise of ubiquitous Machine Learning (ML) …

A flow-based IDS using Machine Learning in eBPF

M Bachl, J Fabini, T Zseby - arXiv preprint arXiv:2102.09980, 2021 - arxiv.org
eBPF is a new technology which allows dynamically loading pieces of code into the Linux
kernel. It can greatly speed up networking since it enables the kernel to process certain …

Botnet communication patterns

G Vormayr, T Zseby, J Fabini - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Malicious botnets have become a common threat and pervade large parts of the Internet
today. Existing surveys and taxonomies focus on botnet topologies, command and control …

[HTML][HTML] Analysis of lightweight feature vectors for attack detection in network traffic

F Meghdouri, T Zseby, F Iglesias - Applied Sciences, 2018 - mdpi.com
Featured Application Optimal design of feature vectors for early-phase attack detection in
large communication networks. Abstract The consolidation of encryption and big data in …

When YouTube does not work—Analysis of QoE-relevant degradation in Google CDN traffic

…, P Fiadino, A Bär, A Finamore, T Zseby - … on Network and …, 2014 - ieeexplore.ieee.org
YouTube is the most popular service in today's Internet. Google relies on its massive content
delivery network (CDN) to push YouTube videos as close as possible to the end-users, both …