The Evolution of Process Hiding Techniques in Malware-Current Threats and Possible Countermeasures S Eresheim, R Luh, S Schrittwieser Journal of Information Processing 25, 866-874, 2017 | 13 | 2017 |
On the impact of kernel code vulnerabilities in IoT devices S Eresheim, R Luh, S Schrittwieser 2017 International Conference on Software Security and Assurance (ICSSA), 1-5, 2017 | 4 | 2017 |
Towards Resilient Artificial Intelligence: Survey and Research Issues O Eigner, S Eresheim, P Kieseberg, LD Klausner, M Pirker, T Priebe, ... 2021 IEEE International Conference on Cyber Security and Resilience (CSR …, 2021 | 2 | 2021 |
Formalizing Real-world Threat Scenarios P Tavolato, R Luh, S Eresheim | | 2022 |
PenQuest Reloaded: A Digital Cyber Defense Game for Technical Education R Luh, S Eresheim, S Großbacher, T Petelin, F Mayr, P Tavolato, ... | | 2022 |
Self-propagating Malware Containment via Reinforcement Learning S Eresheim, D Pasterk International Cross-Domain Conference for Machine Learning and Knowledge …, 2021 | | 2021 |
Anomaly Detection Support Using Process Classification S Eresheim, LD Klausner, P Kochberger 2019 International Conference on Software Security and Assurance (ICSSA), 27-40, 2019 | | 2019 |