Multi-Stage Attack Detection via Kill Chain State Machines F Wilkens, F Ortmann, S Haas, M Vallentin, M Fischer Proceedings of the 3rd Workshop on Cyber-Security Arms Race, 13-24, 2021 | 31 | 2021 |
Efficient attack correlation and identification of attack scenarios based on network-motifs S Haas, F Wilkens, M Fischer 2019 IEEE 38th International Performance Computing and Communications …, 2019 | 18 | 2019 |
Towards Efficient Reconstruction of Attacker Lateral Movement F Wilkens, S Haas, D Kaaser, P Kling, M Fischer Proceedings of the 14th International Conference on Availability …, 2019 | 17 | 2019 |
Passive, transparent, and selective TLS decryption for network security monitoring F Wilkens, S Haas, J Amann, M Fischer IFIP International Conference on ICT Systems Security and Privacy Protection …, 2022 | 15 | 2022 |
Scan Correlation–Revealing distributed scan campaigns S Haas, F Wilkens, M Fischer NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium, 1-6, 2020 | 4 | 2020 |
Towards Data-Driven Characterization of Brute-Force Attackers F Wilkens, M Fischer 2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020 | 2 | 2020 |
Tell Me More: Black Box Explainability for APT Detection on System Provenance Graphs F Welter, F Wilkens, M Fischer ICC 2023-IEEE International Conference on Communications, 3817-3823, 2023 | 1 | 2023 |
Methods for Enhanced Security Monitoring and APT Detection in Enterprise Networks F Wilkens Staats-und Universitätsbibliothek Hamburg Carl von Ossietzky, 2022 | 1 | 2022 |
Towards Flexible Security Testing of OT Devices F Wilkens, S Botzler, J Curts, S Dinter, M Hamann, V Hubbe, A Kornivetc, ... arXiv preprint arXiv:2008.10538, 2020 | 1 | 2020 |