Tanja Zseby

Orcid: 0000-0002-5391-467X

Affiliations:
  • TU Wien, Vienna, Austria


According to our database1, Tanja Zseby authored at least 111 papers between 1998 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Temporal silhouette: validation of stream clustering robust to concept drift.
Mach. Learn., April, 2024

2023
Anomaly detection in streaming data: A comparison and evaluation study.
Expert Syst. Appl., December, 2023

Communications for Energy Systems.
Elektrotech. Informationstechnik, August, 2023

dSalmon: High-Speed Anomaly Detection for Evolving Multivariate Data Streams.
Proceedings of the Performance Evaluation Methodologies and Tools, 2023

SDOclust: Clustering with Sparse Data Observers.
Proceedings of the Similarity Search and Applications - 16th International Conference, 2023

2022
Modeling data with observers.
Intell. Data Anal., 2022

Separating Flows in Encrypted Tunnel Traffic.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

2021
Clustering refinement.
Int. J. Data Sci. Anal., 2021

A flow-based IDS using Machine Learning in eBPF.
CoRR, 2021

Shedding Light in the Tunnel: Counting Flows in Encrypted Network Traffic.
Proceedings of the 2021 International Conference on Data Mining, 2021

Subverting Counter Mode Encryption for Hidden Communication in High-Security Infrastructures.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

SecTULab: A Moodle-Integrated Secure Remote Access Architecture for Cyber Security Laboratories.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Absolute Cluster Validity.
IEEE Trans. Pattern Anal. Mach. Intell., 2020

Optimizing Congestion Control Through Fair Queuing Detection.
CoRR, 2020

Why are My Flows Different? A Tutorial on Flow Exporters.
IEEE Commun. Surv. Tutorials, 2020

MDCStream: Stream Data Generator for Testing Analysis Algorithms.
Proceedings of the VALUETOOLS 2020: 13th EAI International Conference on Performance Evaluation Methodologies and Tools, 2020

Anomaly Detection for Mixed Packet Sequences.
Proceedings of the 45th IEEE LCN Symposium on Emerging Topics in Networking, 2020

LFQ: Online Learning of Per-flow Queuing Policies using Deep Reinforcement Learning.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020

SDOstream: Low-Density Models for Streaming Outlier Detection.
Proceedings of the 28th European Symposium on Artificial Neural Networks, 2020

Interpretability and Refinement of Clustering.
Proceedings of the 7th IEEE International Conference on Data Science and Advanced Analytics, 2020

Cross-Layer Profiling of Encrypted Network Data for Anomaly Detection.
Proceedings of the 7th IEEE International Conference on Data Science and Advanced Analytics, 2020

EagerNet: Early Predictions of Neural Networks for Computationally Efficient Intrusion Detection.
Proceedings of the 4th Cyber Security in Networking Conference, 2020

SparseIDS: Learning Packet Sampling with Reinforcement Learning.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

Explainability and Adversarial Robustness for RNNs.
Proceedings of the 6th IEEE International Conference on Big Data Computing Service and Applications, 2020

2019
Malware propagation in smart grid networks: metrics, simulation and comparison of three malware types.
J. Comput. Virol. Hacking Tech., 2019

Pattern Discovery in Internet Background Radiation.
IEEE Trans. Big Data, 2019

Fuzzy classification boundaries against adversarial network attacks.
Fuzzy Sets Syst., 2019

MDCGen: Multidimensional Dataset Generator for Clustering.
J. Classif., 2019

Are Network Attacks Outliers? A Study of Space Representations and Unsupervised Algorithms.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2019

Extreme Dimensionality Reduction for Network Attack Visualization with Autoencoders.
Proceedings of the International Joint Conference on Neural Networks, 2019

Rax: Deep Reinforcement Learning for Congestion Control.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Walling up Backdoors in Intrusion Detection Systems.
Proceedings of the 3rd ACM CoNEXT Workshop on Big DAta, 2019

Cocoa: Congestion Control Aware Queuing.
Proceedings of the BS '19: 2019 Workshop on Buffer Sizing, 2019

BeaconBlocks: Augmenting Proof-of-Stake with On-Chain Time Synchronization.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
Subliminal Channels in High-Speed Signatures.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

Cyber-Physical Systems - Security.
Elektrotech. Informationstechnik, 2018

Malware propagation in smart grid monocultures.
Elektrotech. Informationstechnik, 2018

Encryption is Futile: Delay Attacks on High-Precision Clock Synchronization.
CoRR, 2018

ChainChannels: Private Botnet Communication Over Public Blockchains.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Outlier Detection Based on Low Density Models.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018

Stealthy Attacks on Smart Grid PMU State Estimation.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

To Trust or Not to Trust: Data Origin Authentication for Group Communication in 5G Networks.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Analytic Study of Features for the Detection of Covert Timing Channels in NetworkTraffic.
J. Cyber Secur. Mobil., 2017

The FUSE testbed: establishing a microgrid for smart grid security experiments.
Elektrotech. Informationstechnik, 2017

SecureTime: Secure Multicast Time Synchronization.
CoRR, 2017

Botnet Communication Patterns.
IEEE Commun. Surv. Tutorials, 2017

Network-Based Secret Communication in Clouds: A Survey.
IEEE Commun. Surv. Tutorials, 2017

A Meta-Analysis Approach for Feature Selection in Network Traffic Research.
Proceedings of the Reproducibility Workshop, 2017

Detection and mitigation of cascading failures in interconnected power systems.
Proceedings of the 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe, 2017

It's about Time: Securing Broadcast Time Synchronization with Data Origin Authentication.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Toggle MUX: How X-Optimism Can Lead to Malicious Hardware.
Proceedings of the 54th Annual Design Automation Conference, 2017

Attack Models for Advanced Persistent Threats in Smart Grid Wide Area Monitoring.
Proceedings of the 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, 2017

Decision Tree Rule Induction for Detecting Covert Timing Channels in TCP/IP Traffic.
Proceedings of the Machine Learning and Knowledge Extraction, 2017

A Subliminal Channel in EdDSA: Information Leakage with High-Speed Signatures.
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017

A New Direction for Research on Data Origin Authentication in Group Communication.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

Are Network Covert Timing Channels Statistical Anomalies?
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
The Right Time: Reducing Effective End-to-End Delay in Time-Slotted Packet-Switched Networks.
IEEE/ACM Trans. Netw., 2016

Teaching Network Security With IP Darkspace Data.
IEEE Trans. Educ., 2016

A Network Steganography Lab on Detecting TCP/IP Covert Channels.
IEEE Trans. Educ., 2016

DAT detectors: uncovering TCP/IP covert channels by descriptive analytics.
Secur. Commun. Networks, 2016

Time-activity footprints in IP traffic.
Comput. Networks, 2016

Resilience and Security: A Qualitative Survey of Urban Smart Grid Architectures.
IEEE Access, 2016

Big-DAMA: Big Data Analytics for Network Traffic Monitoring and Analysis.
Proceedings of the 2016 workshop on Fostering Latin-American Research in Data Communication Networks, 2016

Data Integrity Attacks in Smart Grid Wide Area Monitoring.
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016

2015
Analysis of network traffic features for anomaly detection.
Mach. Learn., 2015

Representative Delay Measurements (RDM): Facing the Challenge of Modern Networks.
EAI Endorsed Trans. Energy Web, 2015

Entropy-Based Characterization of Internet Background Radiation.
Entropy, 2015

M2M communication delay challenges: Application and measurement perspectives.
Proceedings of the 2015 IEEE International Instrumentation and Measurement Technology Conference (I2MTC) Proceedings, 2015

2014
When YouTube Does not Work - Analysis of QoE-Relevant Degradation in Google CDN Traffic.
IEEE Trans. Netw. Serv. Manag., 2014

Synchrophasor communication.
Elektrotech. Informationstechnik, 2014

Security Challenges for Wide Area Monitoring in Smart Grids.
Elektrotech. Informationstechnik, 2014

Nightlights: Entropy-Based Metrics for Classifying Darkspace Traffic Patterns.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014

Modelling IP darkspace traffic by means of clustering techniques.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Flow Selection Techniques.
RFC, September, 2013

The Day after Patch Tuesday: Effects Observable in IP Darkspace Traffic.
Proceedings of the Passive and Active Measurement - 14th International Conference, 2013

2012
Workshop report: darkspace and unsolicited traffic analysis (DUST 2012).
Comput. Commun. Rev., 2012

Is IPv6 Ready for the Smart Grid?
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

2011
On Creating Overlay Routing Topologies between Heterogeneous Experimental Facilities.
Proceedings of the Testbeds and Research Infrastructure. Development of Networks and Communities, 2011

MultiNext - Measuring concurrent multipath transmissions in an experimental facility.
Proceedings of the 7th Conference on Next Generation Internet, 2011

Performance of concurrent multipath transmissions - Measurements and model validation.
Proceedings of the 7th Conference on Next Generation Internet, 2011

Multipath Routing Slice Experiments in Federated Testbeds.
Proceedings of the Future Internet, 2011

2010
Kooperationsstrategien für Netzwerkmanagement im Internet der Zukunft.
Inform. Spektrum, 2010

Assessment - Ein Ansatz zur Evaluierung selbstorganisierender Systeme.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2010

Packet Tracking in PlanetLab Europe - A Use Case.
Proceedings of the Testbeds and Research Infrastructures. Development of Networks and Communities, 2010

G-Lab Deep: Cross-Layer Composition and Security for a Flexible Future Internet.
Proceedings of the Testbeds and Research Infrastructures. Development of Networks and Communities, 2010

Multi-hop packet tracking for experimental facilities.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010

2009
Specification of the IP Flow Information Export (IPFIX) File Format.
RFC, October, 2009

Exporting Type Information for IP Flow Information Export (IPFIX) Information Elements.
RFC, July, 2009

Sampling and Filtering Techniques for IP Packet Selection.
RFC, March, 2009

IP Flow Information Export (IPFIX) Applicability.
RFC, March, 2009

With Joint Forces - Establishing Situation Awareness for the Future Internet.
ERCIM News, 2009

Empirical Evaluation of Hash Functions for PacketID Generation in Sampled Multipoint Measurements.
Proceedings of the Passive and Active Network Measurement, 10th International Conference, 2009

Towards a Future Internet: Node Collaboration for Autonomic Communication.
Proceedings of the Towards the Future Internet - A European Research Perspective, 2009

Concepts for Self-Protection.
Proceedings of the Autonomic Computing and Networking, 2009

2008
Self-Protecting Networks - How Cooperation Strategies Can Strengthen Network Security (Selbstschützende Netze - Netzwerksicherheit durch Kooperation).
it Inf. Technol., 2008

Empirical evaluation of hash functions for multipoint measurements.
Comput. Commun. Rev., 2008

Packet Sampling for Flow Accounting: Challenges and Limitations.
Proceedings of the Passive and Active Network Measurement, 9th International Conference, 2008

Evaluation of Header Field Entropy for Hash-Based Packet Selection.
Proceedings of the Passive and Active Network Measurement, 9th International Conference, 2008

08102 Outcome Working Group -- Situational Awareness.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

08102 Working Group -- Measurement Requirements.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

2007
Requirements for a Standardized Flow Storage Solution.
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007

Network Immunity: What can we Learn from Nature for Network Protection?
Proceedings of the 2nd International ICST Conference on Bio-Inspired Models of Network, 2007

2006
A measurement framework for inter-domain SLA validation.
Comput. Commun., 2006

2005
Statistical sampling for non intrusive measurements in IP networks.
PhD thesis, 2005

Multicast.
Proceedings of the Industrial Information Technology Handbook, 2005

2004
Requirements for IP Flow Information Export (IPFIX).
RFC, October, 2004

2002
Policy-Based Accounting.
RFC, October, 2002

2001
Policy-basiertes Metering für IP-Netze.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2001

1999
Charging and Accounting for QoS-Enhanced IP Multicast.
Proceedings of the Protocols for High Speed Networks VI, 1999

Lastabhängige Tarifierung von IP Multicast-Diensten mit Dienstgüteunterstützung.
Proceedings of the Kommunikation in Verteilten Systemen, 1999

1998
Dienstqualitätsunterstützung für Audio- und Videodienste im Internet.
Prax. Inf.verarb. Kommun., 1998


  Loading...