Wolfgang Hotwagner

Orcid: 0000-0002-2127-4997

According to our database1, Wolfgang Hotwagner authored at least 12 papers between 2019 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Trace of the Times: Rootkit Detection through Temporal Anomalies in Kernel Activity.
CoRR, March, 2025

2024
Dynamic Shields: A Game-Theoretic Reinforcement Learning Framework for APT Mitigation.
Proceedings of the Game Theory and AI for Security, 2024

2023
Maintainable Log Datasets for Evaluation of Intrusion Detection Systems.
IEEE Trans. Dependable Secur. Comput., 2023

AMiner: A Modular Log Data Analysis Pipeline for Anomaly-based Intrusion Detection.
DTRAP, 2023

2022
Kyoushi Testbed Environment: A Model-driven Simulation Framework to Generate Open Log Data Sets for Security Evaluations.
ERCIM News, 2022

A Framework for Automatic Labeling of Log Datasets from Model-driven Testbeds for HIDS Evaluation.
Proceedings of the Sat-CPS@CODASPY 2022: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2022

2021
Have it Your Way: Generating Customized Log Datasets With a Model-Driven Simulation Testbed.
IEEE Trans. Reliab., 2021

Enabling exercises, education and research with a comprehensive cyber range.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

2020
Have It Your Way: Generating Customized Log Data Sets with a Model-driven Simulation Testbed.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

Visualizing Syscalls using Self-organizing Maps for System Intrusion Detection.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

AIT Cyber Range: Flexible Cyber Security Environment for Exercises, Training and Research.
Proceedings of the EICC 2020: European Interdisciplinary Cybersecurity Conference, 2020

2019
A Framework for Cyber Threat Intelligence Extraction from Raw Log Data.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019


  Loading...