Name Authors Published In Download
Analyzing the Real-World Applicability of DGA Classifiers Arthur Drichel, Ulrike Meyer (RWTH)
Samuel Schüppen, Dominik Teubert (Siemens CERT)
Privacy Illusion: Beware of Unpadded DoH Karel Hynek (CESNET), Tomas Cejka (CESNET) IEMCON2020 PDF
Interpretable Visualizations of Deep Neural Networks for Domain Generation Algorithm Detection Franziska Becker, Arthur Drichel, Christoph Müller, Thomas Ertl (USTUTT) VizSec 2020 PDF
DoH Insight: Detecting DNS over HTTPS by Machine Learning Dmitrii Vekshin (FIT CTU), Karel Hynek (CESNET), Tomas Cejka (CESNET) CyberTIM 2020 PDF
Making Use of NXt to Nothing: The Effect of Class Imbalances on DGA Detection Classifiers Arthur Drichel, Ulrike Meye (RWTH)
Samuel Schüppen, Dominik Teubert (Siemens CERT)
CyberTIM 2020 PDF
Host Behavior in Computer Network: One-Year Study Tomas Jirsik (MU),
Petr Velan (MU)
IEEE Transactions on Network and Service Management 2021 PDF
Predictive methods in cyber defense: Current experience and research challenges Martin Husák (MU), Václav Bartoš (CESNET)
Pavol Sokol and Andrej Gajdoš (Pavol Jozef Šafárik University)
Future Generation Computer Systems Link
GRANEF: Utilization of a Graph Database for Network Forensics Milan Cermak (MU),
Denisa Sramkova (MU)
Towards Privacy-Preserving Sharing of Cyber Threat Intelligence for Effective Response and Recovery Lasse Nitz, Mehdi Akbari Gurabi, Avikarsha Mandal and Benjamin Heitmann (FIT) ERCIM NEWS 126 PDF
Finding Phish in a Haystack: A Pipeline for Phishing Classification on Certificate Transparency Logs Arthur Drichel (RWTH), Vincent Drury (RWTH), Justus von Brandt (RWTH), Ulrike Meyer (RWTH) IWCC 2021 PDF
First Step Towards EXPLAINable DGA Multiclass Classification Arthur Drichel (RWTH), Nils Faerber (RWTH), Ulrike Meyer (RWTH) ARES 2021 PDF
Sharing FANCI Features: A Privacy Analysis of Feature Extraction for DGA Detection Benedikt Holmes (RWTH), Arthur Drichel (RWTH), Ulrike Meyer (RWTH) CYBER 2021 PDF
The More, the Better? A Study on Collaborative Machine Learning for DGA Detection Arthur Drichel (RWTH), Benedikt Holmes (RWTH), Justus von Brandt (RWTH), Ulrike Meyer (RWTH) CYSARM 2021 PDF
Towards Privacy-Preserving Classification-as-a-Service for DGA Detection Arthur Drichel (RWTH), Mehdi Akbari Gurabi (FIT), Tim Amelung (RWTH), Ulrike Meyer (RWTH) PST 2021 PDF
VITALflow: Visual Interactive Traffic Analysis with NetFlow Tina Tremel, Jochen Kögel, Florian Jauernig, Sebastian Meier (IsarNet), Dennis Thom, Franziska Becker, Christoph Müller, Steffen Koch (USTUTT) NOMS 2022 Workshops - AnNet 2022 PDF
From Collaboration to Automation: A Proof of Concept for Improved Incident Response Lasse Nitz (Fraunhofer FIT), Martin Zadnik (CESNET), Mehdi Akbari Gurabi (Fraunhofer FIT), Mischa Obrecht (Dreamlab Technologies AG), Avikarsha Mandal (Fraunhofer FIT) ERCIM News 129 Link
On the Integration of Course of Action Playbooks into Shareable Cyber Threat Intelligence Vasileios Mavroeidis (University of Oslo), Pavel Eis (CESNET), Martin Zadnik (CESNET), Marco Caselli (Siemens), Bret Jordan (Broadcom) IEEE International Conference on Big Data (Big Data) Link
Towards Evaluating Quality of Datasets for Network Traffic Domain Dominik Soukup (CTU), Peter Tisovčík (Brno University of Technology), Karel Hynek and Tomáš Čejka (CESNET) 7th International Conference on Network and Service Management (CNSM) Link
Towards Inference of DDoS Mitigation Rules Martin Žádník (CESNET) IEEE/IFIP Network Operations and Management Symposium
Predictivemethodsincyberdefense:Currentexperienceandresearchchallenges Martin Husák (MU), Václav Bartoš (CESNET), Pavol Sokol, Andrej Gajdoš (Pavol Jozef Šafárik University) Future Generation Computer Systems Vol. 115 Link
Interactive process tree analysis Poster Robert Rapp, Christoph Müller, Franziska Becker (USTUTT), Paolo Palumbo (F-Secure), Thomas Ertl (USTUTT) VizSec 2021 PDF
SoK: Applications and Challenges of using Recommender Systems in Cybersecurity Incident Handling and Response Martin Husák, Milan Čermák (MU) ARES 2022
SASP: a Semantic web-based Approach for management of Sharable cybersecurity Playbooks Mehdi Akbari Gurabi (RWTH, FIT), Avikarsha Mandal , Jan Popanda (FIT), Robert Rapp (USTUTT), Stefan Decker (RWTH, FIT) IWCC 2022 PDF
Detecting Unknown DGAs without Context Information Arthur Drichel, Justus von Brandt, Ulrike Meyer (RWTH) ARES 2022
Dating Phish: An Analysis of the Life Cycles of Phishing Attacks and Campaigns Vincent Drury, Luisa Lux, Ulrike Meyer (RWTH) ARES 2022