Sarah Wunderlich

According to our database1, Sarah Wunderlich authored at least 5 papers between 2017 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
The Impact of Different System Call Representations on Intrusion Detection.
Log. J. IGPL, 2022

2021
Malware detection on windows audit logs using LSTMs.
Comput. Secur., 2021

2019
A survey of network-based intrusion detection data sets.
Comput. Secur., 2019

Comparison of System Call Representations for Intrusion Detection.
Proceedings of the International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019), 2019

2017
Follow me: A simple approach for person identification and tracking.
Proceedings of the 26th IEEE International Symposium on Industrial Electronics, 2017


  Loading...