Mirko Sailio

Orcid: 0000-0002-6897-9943

According to our database1, Mirko Sailio authored at least 12 papers between 2011 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2017
Visualizing network events in a muggle friendly way.
Proceedings of the 2017 International Conference On Cyber Situational Awareness, 2017

2016
Adaptive monitoring and management of security events with SDN.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

2015
Vulnerability database analysis for 10 years for ensuring security of cyber critical green infrastructures.
Proceedings of the AFRICON 2015, Addis Ababa, Ethiopia, September 14-17, 2015, 2015

2014
A module for anomaly detection in ICS networks.
Proceedings of the 3rd International Conference on High Confidence Networked Systems (part of CPS Week), 2014

Identity-Based Cryptography in Credit Card Payments.
Proceedings of the Cryptography and Security Systems - Third International Conference, 2014

Detecting Anomalies in Printed Intelligence Factory Network.
Proceedings of the Risks and Security of Internet and Systems, 2014

Detecting man-in-the-middle attacks on non-mobile systems.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Network Security Analysis Using Behavior History Graph.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Network Traffic Features for Anomaly Detection in Specific Industrial Control System Network.
Future Internet, 2013

2012
Feature Selection for Machine Learning Based Anomaly Detection in Industrial Control System Networks.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012

Challenges of Machine Learning Based Monitoring for Industrial Control System Networks.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Two-phased method for identifying SSH encrypted application flows.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011


  Loading...