Paul Tavolato

According to our database1, Paul Tavolato authored at least 22 papers between 1986 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

2023
A Game Theoretic Analysis of Cyber Threats.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Enhancing Trust in Machine Learning Systems by Formal Methods - With an Application to a Meteorological Problem.
Proceedings of the Machine Learning and Knowledge Extraction, 2023

2022
Formalizing Real-world Threat Scenarios.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

PenQuest Reloaded: A Digital Cyber Defense Game for Technical Education.
Proceedings of the IEEE Global Engineering Education Conference, 2022

2020
Analytical modelling of cyber-physical systems: applying kinetic gas theory to anomaly detection in networks.
J. Comput. Virol. Hacking Tech., 2020

Anomaly detection in substation networks.
J. Inf. Secur. Appl., 2020

Anomaly Detection in Communication Networks of Cyber-physical Systems using Cross-over Data Compression.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

2019
Analytical Modelling of Cyber-physical Systems.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

2018
Attacks on Industrial Control Systems - Modeling and Anomaly Detection.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

2017
Rule Creation in a Knowledge-assisted Visual Analytics Prototype for Malware Analysis.
Proceedings of the 10th Forum Media Technology and 3rd All Around Audio Symposium, 2017

Anomaly-Based Detection and Classification of Attacks in Cyber-Physical Systems.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

Anomaly Detection for Simulated IEC-60870-5-104 Trafiic.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Detection of Man-in-the-Middle Attacks on Industrial Control Networks.
Proceedings of the International Conference on Software Security and Assurance, 2016

2015
Multi-Layer Agent-Based Simulation of Network Behaviour in Advanced Metering Infrastructures.
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

2014
Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis.
Proceedings of the 11th Workshop on Visualization for Cyber Security, 2014

Malicious Behavior Patterns.
Proceedings of the 8th IEEE International Symposium on Service Oriented System Engineering, 2014

Defining Malicious Behavior.
Proceedings of the Ninth International Conference on Availability, 2014

2011
Advanced File Carving Approaches for Multimedia Files.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

1989
Theoretische und empirische Untersuchungen der Benutzeroberfläche von zwei CAD-Systemen.
Proceedings of the Software-Ergonomie '89, 1989

1987
Ein Werkzeug zum Wissenserwerb.
Proceedings of the 3. Österreichische Artificial Intelligence-Tagung, 1987

1986
Prototyping. Die Methode - das Werkzeug - die Erfahrungen.
Angew. Inform., 1986


  Loading...