Cited By
View all- Vermeer MKadenko Nvan Eeten MGañán CParkin SMeng WJensen CCremers CKirda E(2023)Alert Alchemy: SOC Workflows and Decisions in the Management of NIDS RulesProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616581(2770-2784)Online publication date: 15-Nov-2023
- Vermeer Mvan Eeten MGañán CSuga YSakurai KDing XSako K(2022)Ruling the RulesProceedings of the 2022 ACM on Asia Conference on Computer and Communications Security10.1145/3488932.3517412(799-814)Online publication date: 30-May-2022
- Yao DShu XCheng LStolfo S(2017)Anomaly Detection as a Service: Challenges, Advances, and OpportunitiesSynthesis Lectures on Information Security, Privacy, and Trust10.2200/S00800ED1V01Y201709SPT0229:3(1-173)Online publication date: 24-Oct-2017
- Show More Cited By