Published in: Dagstuhl Reports, Volume 13, Issue 10 (2024)
Sven Dietrich, Frank Kargl, Hartmut König, Pavel Laskov, and Artur Hermann. Network Attack Detection and Defense - AI-Powered Threats and Responses (Dagstuhl Seminar 23431). In Dagstuhl Reports, Volume 13, Issue 10, pp. 90-129, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2024)
@Article{dietrich_et_al:DagRep.13.10.90, author = {Dietrich, Sven and Kargl, Frank and K\"{o}nig, Hartmut and Laskov, Pavel and Hermann, Artur}, title = {{Network Attack Detection and Defense - AI-Powered Threats and Responses (Dagstuhl Seminar 23431)}}, pages = {90--129}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2024}, volume = {13}, number = {10}, editor = {Dietrich, Sven and Kargl, Frank and K\"{o}nig, Hartmut and Laskov, Pavel and Hermann, Artur}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.13.10.90}, URN = {urn:nbn:de:0030-drops-198365}, doi = {10.4230/DagRep.13.10.90}, annote = {Keywords: artificial intelligence, cybersecurity, intrusion detection, machine learning} }
Published in: Dagstuhl Reports, Volume 6, Issue 9 (2017)
Marc C. Dacier, Sven Dietrich, Frank Kargl, and Hartmut König. Network Attack Detection and Defense (Dagstuhl Seminar 16361). In Dagstuhl Reports, Volume 6, Issue 9, pp. 1-28, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2017)
@Article{dacier_et_al:DagRep.6.9.1, author = {Dacier, Marc C. and Dietrich, Sven and Kargl, Frank and K\"{o}nig, Hartmut}, title = {{Network Attack Detection and Defense (Dagstuhl Seminar 16361)}}, pages = {1--28}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2017}, volume = {6}, number = {9}, editor = {Dacier, Marc C. and Dietrich, Sven and Kargl, Frank and K\"{o}nig, Hartmut}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.6.9.1}, URN = {urn:nbn:de:0030-drops-69122}, doi = {10.4230/DagRep.6.9.1}, annote = {Keywords: attack detection, denial-of-service attack detection and response, intrusion detection, malware assessment, network monitoring, openflow protocol, programmable networks, security, software-defined networking, targeted attacks, vulnerability analysis} }
Published in: Dagstuhl Reports, Volume 4, Issue 1 (2014)
Julie E. Cohen, Sven Dietrich, Aiko Pras, Lenore D. Zuck, and Hildebrand Mireille. Ethics in Data Sharing (Dagstuhl Seminar 14052). In Dagstuhl Reports, Volume 4, Issue 1, pp. 170-183, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2014)
@Article{cohen_et_al:DagRep.4.1.170, author = {Cohen, Julie E. and Dietrich, Sven and Pras, Aiko and Zuck, Lenore D. and Hildebrand Mireille}, title = {{Ethics in Data Sharing (Dagstuhl Seminar 14052)}}, pages = {170--183}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2014}, volume = {4}, number = {1}, editor = {Cohen, Julie E. and Dietrich, Sven and Pras, Aiko and Zuck, Lenore D. and Hildebrand Mireille}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.4.1.170}, URN = {urn:nbn:de:0030-drops-45418}, doi = {10.4230/DagRep.4.1.170}, annote = {Keywords: Ethics, Data Sharing Practices, Data Dissemination, Ethics across borders, Anonymization, Sanitization} }
Feedback for Dagstuhl Publishing