Published in: Dagstuhl Reports, Volume 12, Issue 7 (2023)
Battista Biggio, Nicholas Carlini, Pavel Laskov, Konrad Rieck, and Antonio Emanuele Cinà. Security of Machine Learning (Dagstuhl Seminar 22281). In Dagstuhl Reports, Volume 12, Issue 7, pp. 41-61, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)
@Article{biggio_et_al:DagRep.12.7.41, author = {Biggio, Battista and Carlini, Nicholas and Laskov, Pavel and Rieck, Konrad and Cin\`{a}, Antonio Emanuele}, title = {{Security of Machine Learning (Dagstuhl Seminar 22281)}}, pages = {41--61}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2023}, volume = {12}, number = {7}, editor = {Biggio, Battista and Carlini, Nicholas and Laskov, Pavel and Rieck, Konrad and Cin\`{a}, Antonio Emanuele}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.12.7.41}, URN = {urn:nbn:de:0030-drops-176117}, doi = {10.4230/DagRep.12.7.41}, annote = {Keywords: adversarial machine learning, machine learning security} }
Published in: Dagstuhl Seminar Proceedings, Volume 8102, Perspectives Workshop: Network Attack Detection and Defense (2008)
Marc Daciér, Hervé Debar, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Konrad Rieck, and James Sterbenz. 4. 8102 Working Group – Attack Taxonomy. In Perspectives Workshop: Network Attack Detection and Defense. Dagstuhl Seminar Proceedings, Volume 8102, pp. 1-4, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)
@InProceedings{dacier_et_al:DagSemProc.08102.4, author = {Daci\'{e}r, Marc and Debar, Herv\'{e} and Holz, Thorsten and Kirda, Engin and Kohlrausch, Jan and Kruegel, Christopher and Rieck, Konrad and Sterbenz, James}, title = {{4. 8102 Working Group – Attack Taxonomy}}, booktitle = {Perspectives Workshop: Network Attack Detection and Defense}, pages = {1--4}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2008}, volume = {8102}, editor = {Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K\"{o}nig and Christopher Kruegel}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08102.4}, URN = {urn:nbn:de:0030-drops-14955}, doi = {10.4230/DagSemProc.08102.4}, annote = {Keywords: Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma network monitoring, flow analysis, denial of service detection and response, event correlation} }
Published in: Dagstuhl Seminar Proceedings, Volume 8102, Perspectives Workshop: Network Attack Detection and Defense (2008)
Lothar Braun, Falko Dressler, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Tobias Limmer, Konrad Rieck, and James Sterbenz. 6. 08102 Working Group – Requirements for Network Monitoring from an IDS Perspective. In Perspectives Workshop: Network Attack Detection and Defense. Dagstuhl Seminar Proceedings, Volume 8102, pp. 1-4, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)
@InProceedings{braun_et_al:DagSemProc.08102.6, author = {Braun, Lothar and Dressler, Falko and Holz, Thorsten and Kirda, Engin and Kohlrausch, Jan and Kruegel, Christopher and Limmer, Tobias and Rieck, Konrad and Sterbenz, James}, title = {{6. 08102 Working Group – Requirements for Network Monitoring from an IDS Perspective}}, booktitle = {Perspectives Workshop: Network Attack Detection and Defense}, pages = {1--4}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2008}, volume = {8102}, editor = {Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K\"{o}nig and Christopher Kruegel}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08102.6}, URN = {urn:nbn:de:0030-drops-14970}, doi = {10.4230/DagSemProc.08102.6}, annote = {Keywords: Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma network monitoring, flow analysis, denial of service detection and response, event correlation} }
Feedback for Dagstuhl Publishing