Max Landauer
Orcid: 0000-0003-3813-3151
According to our database1,
Max Landauer
authored at least 33 papers
between 2017 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Analysis of statistical properties of variables in log data for advanced anomaly detection in cyber security.
Comput. Secur., February, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
A Critical Review of Common Log Data Sets Used for Evaluation of Sequence-based Anomaly Detection Techniques.
CoRR, 2023
Towards Detecting Anomalies in Log-Event Sequences with Deep Learning: Open Research Challenges.
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023
2022
Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation.
Proceedings of the Cybersecurity of Digital Service Chains, 2022
Proceedings of the Cybersecurity of Digital Service Chains, 2022
Dealing with Security Alert Flooding: Using Machine Learning for Domain-independent Alert Aggregation.
ACM Trans. Priv. Secur., 2022
IEEE Secur. Priv., 2022
IEEE Secur. Priv., 2022
Kyoushi Testbed Environment: A Model-driven Simulation Framework to Generate Open Log Data Sets for Security Evaluations.
ERCIM News, 2022
Strategic selection of data sources for cyber attack detection in enterprise networks: a survey and approach.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022
A Framework for Automatic Labeling of Log Datasets from Model-driven Testbeds for HIDS Evaluation.
Proceedings of the Sat-CPS@CODASPY 2022: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2022
A User and Entity Behavior Analytics Log Data Set for Anomaly Detection in Cloud Computing.
Proceedings of the IEEE International Conference on Big Data, 2022
2021
Have it Your Way: Generating Customized Log Datasets With a Model-Driven Simulation Testbed.
IEEE Trans. Reliab., 2021
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
IEEE Secur. Priv., 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Springer, ISBN: 978-3-030-74449-6, 2021
2020
synERGY: Cross-correlation of operational and contextual data to timely detect and mitigate attacks to cyber-physical systems.
J. Inf. Secur. Appl., 2020
ERCIM News, 2020
Comput. Secur., 2020
Have It Your Way: Generating Customized Log Data Sets with a Model-driven Simulation Testbed.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Creating Character-based Templates for Log Data to Enable Security Event Classification.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
INDICÆTING - Automatically Detecting, Extracting, and Correlating Cyber Threat Intelligence from Raw Computer Log Data.
ERCIM News, 2019
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2018
Dynamic log file analysis: An unsupervised cluster evolution approach for anomaly detection.
Comput. Secur., 2018
Proceedings of the Information Security Practice and Experience, 2018
2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017