Name | Authors | Published In | Download |
---|---|---|---|
Analyzing the Real-World Applicability of DGA Classifiers | Arthur Drichel, Ulrike Meyer (RWTH) Samuel Schüppen, Dominik Teubert (Siemens CERT) |
ARES 2020 | |
Privacy Illusion: Beware of Unpadded DoH | Karel Hynek (CESNET), Tomas Cejka (CESNET) | IEMCON2020 | |
Interpretable Visualizations of Deep Neural Networks for Domain Generation Algorithm Detection | Franziska Becker, Arthur Drichel, Christoph Müller, Thomas Ertl (USTUTT) | VizSec 2020 | |
DoH Insight: Detecting DNS over HTTPS by Machine Learning | Dmitrii Vekshin (FIT CTU), Karel Hynek (CESNET), Tomas Cejka (CESNET) | CyberTIM 2020 | |
Making Use of NXt to Nothing: The Effect of Class Imbalances on DGA Detection Classifiers | Arthur Drichel, Ulrike Meye (RWTH) Samuel Schüppen, Dominik Teubert (Siemens CERT) |
CyberTIM 2020 | Host Behavior in Computer Network: One-Year Study | Tomas Jirsik (MU), Petr Velan (MU) |
IEEE Transactions on Network and Service Management 2021 |
Predictive methods in cyber defense: Current experience and research challenges | Martin Husák (MU), Václav Bartoš (CESNET) Pavol Sokol and Andrej Gajdoš (Pavol Jozef Šafárik University) |
Future Generation Computer Systems | Link |
GRANEF: Utilization of a Graph Database for Network Forensics | Milan Cermak (MU), Denisa Sramkova (MU) |
SECRYPT 2021 | |
Towards Privacy-Preserving Sharing of Cyber Threat Intelligence for Effective Response and Recovery | Lasse Nitz, Mehdi Akbari Gurabi, Avikarsha Mandal and Benjamin Heitmann (FIT) | ERCIM NEWS 126 | |
Finding Phish in a Haystack: A Pipeline for Phishing Classification on Certificate Transparency Logs | Arthur Drichel (RWTH), Vincent Drury (RWTH), Justus von Brandt (RWTH), Ulrike Meyer (RWTH) | IWCC 2021 | |
First Step Towards EXPLAINable DGA Multiclass Classification | Arthur Drichel (RWTH), Nils Faerber (RWTH), Ulrike Meyer (RWTH) | ARES 2021 | |
Sharing FANCI Features: A Privacy Analysis of Feature Extraction for DGA Detection | Benedikt Holmes (RWTH), Arthur Drichel (RWTH), Ulrike Meyer (RWTH) | CYBER 2021 | |
The More, the Better? A Study on Collaborative Machine Learning for DGA Detection | Arthur Drichel (RWTH), Benedikt Holmes (RWTH), Justus von Brandt (RWTH), Ulrike Meyer (RWTH) | CYSARM 2021 | |
Towards Privacy-Preserving Classification-as-a-Service for DGA Detection | Arthur Drichel (RWTH), Mehdi Akbari Gurabi (FIT), Tim Amelung (RWTH), Ulrike Meyer (RWTH) | PST 2021 | |
VITALflow: Visual Interactive Traffic Analysis with NetFlow | Tina Tremel, Jochen Kögel, Florian Jauernig, Sebastian Meier (IsarNet), Dennis Thom, Franziska Becker, Christoph Müller, Steffen Koch (USTUTT) | NOMS 2022 Workshops - AnNet 2022 | |
From Collaboration to Automation: A Proof of Concept for Improved Incident Response | Lasse Nitz (Fraunhofer FIT), Martin Zadnik (CESNET), Mehdi Akbari Gurabi (Fraunhofer FIT), Mischa Obrecht (Dreamlab Technologies AG), Avikarsha Mandal (Fraunhofer FIT) | ERCIM News 129 | Link |
On the Integration of Course of Action Playbooks into Shareable Cyber Threat Intelligence | Vasileios Mavroeidis (University of Oslo), Pavel Eis (CESNET), Martin Zadnik (CESNET), Marco Caselli (Siemens), Bret Jordan (Broadcom) | IEEE International Conference on Big Data (Big Data) | Link |
Towards Evaluating Quality of Datasets for Network Traffic Domain | Dominik Soukup (CTU), Peter Tisovčík (Brno University of Technology), Karel Hynek and Tomáš Čejka (CESNET) | 7th International Conference on Network and Service Management (CNSM) | Link |
Towards Inference of DDoS Mitigation Rules | Martin Žádník (CESNET) | IEEE/IFIP Network Operations and Management Symposium | |
Predictivemethodsincyberdefense:Currentexperienceandresearchchallenges | Martin Husák (MU), Václav Bartoš (CESNET), Pavol Sokol, Andrej Gajdoš (Pavol Jozef Šafárik University) | Future Generation Computer Systems Vol. 115 | Link |
Interactive process tree analysis Poster | Robert Rapp, Christoph Müller, Franziska Becker (USTUTT), Paolo Palumbo (F-Secure), Thomas Ertl (USTUTT) | VizSec 2021 | |
SoK: Applications and Challenges of using Recommender Systems in Cybersecurity Incident Handling and Response | Martin Husák, Milan Čermák (MU) | ARES 2022 | |
SASP: a Semantic web-based Approach for management of Sharable cybersecurity Playbooks | Mehdi Akbari Gurabi (RWTH, FIT), Avikarsha Mandal , Jan Popanda (FIT), Robert Rapp (USTUTT), Stefan Decker (RWTH, FIT) | IWCC 2022 | Link |
Detecting Unknown DGAs without Context Information | Arthur Drichel, Justus von Brandt, Ulrike Meyer (RWTH) | ARES 2022 | |
Dating Phish: An Analysis of the Life Cycles of Phishing Attacks and Campaigns | Vincent Drury, Luisa Lux, Ulrike Meyer (RWTH) | ARES 2022 | |
DGA Detection Using Similarity-Preserving Bloom Encodings | Lasse Nitz (FIT, RWTH), Avikarsha Mandal (FIT) | EICC 2023 |