Published in: Dagstuhl Reports, Volume 12, Issue 7 (2023)
Battista Biggio, Nicholas Carlini, Pavel Laskov, Konrad Rieck, and Antonio Emanuele Cinà. Security of Machine Learning (Dagstuhl Seminar 22281). In Dagstuhl Reports, Volume 12, Issue 7, pp. 41-61, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)
@Article{biggio_et_al:DagRep.12.7.41,
author = {Biggio, Battista and Carlini, Nicholas and Laskov, Pavel and Rieck, Konrad and Cin\`{a}, Antonio Emanuele},
title = {{Security of Machine Learning (Dagstuhl Seminar 22281)}},
pages = {41--61},
journal = {Dagstuhl Reports},
ISSN = {2192-5283},
year = {2023},
volume = {12},
number = {7},
editor = {Biggio, Battista and Carlini, Nicholas and Laskov, Pavel and Rieck, Konrad and Cin\`{a}, Antonio Emanuele},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.12.7.41},
URN = {urn:nbn:de:0030-drops-176117},
doi = {10.4230/DagRep.12.7.41},
annote = {Keywords: adversarial machine learning, machine learning security}
}
Published in: Dagstuhl Seminar Proceedings, Volume 8102, Perspectives Workshop: Network Attack Detection and Defense (2008)
Marc Daciér, Hervé Debar, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Konrad Rieck, and James Sterbenz. 4. 8102 Working Group – Attack Taxonomy. In Perspectives Workshop: Network Attack Detection and Defense. Dagstuhl Seminar Proceedings, Volume 8102, pp. 1-4, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)
@InProceedings{dacier_et_al:DagSemProc.08102.4,
author = {Daci\'{e}r, Marc and Debar, Herv\'{e} and Holz, Thorsten and Kirda, Engin and Kohlrausch, Jan and Kruegel, Christopher and Rieck, Konrad and Sterbenz, James},
title = {{4. 8102 Working Group – Attack Taxonomy}},
booktitle = {Perspectives Workshop: Network Attack Detection and Defense},
pages = {1--4},
series = {Dagstuhl Seminar Proceedings (DagSemProc)},
ISSN = {1862-4405},
year = {2008},
volume = {8102},
editor = {Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K\"{o}nig and Christopher Kruegel},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08102.4},
URN = {urn:nbn:de:0030-drops-14955},
doi = {10.4230/DagSemProc.08102.4},
annote = {Keywords: Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma network monitoring, flow analysis, denial of service detection and response, event correlation}
}
Published in: Dagstuhl Seminar Proceedings, Volume 8102, Perspectives Workshop: Network Attack Detection and Defense (2008)
Lothar Braun, Falko Dressler, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Tobias Limmer, Konrad Rieck, and James Sterbenz. 6. 08102 Working Group – Requirements for Network Monitoring from an IDS Perspective. In Perspectives Workshop: Network Attack Detection and Defense. Dagstuhl Seminar Proceedings, Volume 8102, pp. 1-4, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)
@InProceedings{braun_et_al:DagSemProc.08102.6,
author = {Braun, Lothar and Dressler, Falko and Holz, Thorsten and Kirda, Engin and Kohlrausch, Jan and Kruegel, Christopher and Limmer, Tobias and Rieck, Konrad and Sterbenz, James},
title = {{6. 08102 Working Group – Requirements for Network Monitoring from an IDS Perspective}},
booktitle = {Perspectives Workshop: Network Attack Detection and Defense},
pages = {1--4},
series = {Dagstuhl Seminar Proceedings (DagSemProc)},
ISSN = {1862-4405},
year = {2008},
volume = {8102},
editor = {Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K\"{o}nig and Christopher Kruegel},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08102.6},
URN = {urn:nbn:de:0030-drops-14970},
doi = {10.4230/DagSemProc.08102.6},
annote = {Keywords: Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma network monitoring, flow analysis, denial of service detection and response, event correlation}
}