Martin Drasar

Orcid: 0000-0002-9623-1756

According to our database1, Martin Drasar authored at least 18 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Towards a Visual Analytics Workflow for Cybersecurity Simulations.
Proceedings of the 18th International Joint Conference on Computer Vision, 2023

The Road Towards Autonomous Cybersecurity Agents: Remedies for Simulation Environments.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

2022
Perception of the Environment.
CoRR, 2022

2020
Session-level Adversary Intent-Driven Cyberattack Simulator.
Proceedings of the 24th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, 2020

Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems.
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020

2019
IT Operations Analytics: Root Cause Analysis via Complex Event Processing.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

2018
Report on the 10th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2016) - Management and Security in the Age of Hyperconnectivity.
J. Netw. Syst. Manag., 2018

Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152-RTG.
CoRR, 2018

Initial Reference Architecture of an Intelligent Autonomous Agent for Cyber Defense.
CoRR, 2018

Towards Provable Network Traffic Measurement and Analysis via Semi-Labeled Trace Datasets.
Proceedings of the Network Traffic Measurement and Analysis Conference, 2018

Towards an active, autonomous and intelligent cyber defense of military systems: The NATO AICA reference architecture.
Proceedings of the International Conference on Military Communications and Information Systems, 2018

2017
Network defence strategy evaluation: Simulation vs. live network.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

2015
A survey of methods for encrypted traffic classification and analysis.
Int. J. Netw. Manag., 2015

2014
Similarity as a central approach to flow-based anomaly detection.
Int. J. Netw. Manag., 2014

Cloud-based testbed for simulation of cyber attacks.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Enhancing Network Intrusion Detection by Correlation of Modularly Hashed Sketches.
Proceedings of the Monitoring and Securing Virtualized Networks and Services, 2014

2013
Protocol-Independent Detection of Dictionary Attacks.
Proceedings of the Advances in Communication Networking, 2013

2010
Aspect-Based Attack Detection in Large-Scale Networks.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010


  Loading...