A survey of network-based intrusion detection data sets M Ring, S Wunderlich, D Scheuring, D Landes, A Hotho Computers & Security 86, 147-167, 2019 | 382 | 2019 |
Flow-based benchmark data sets for intrusion detection M Ring, S Wunderlich, D Grüdl, D Landes, A Hotho Proceedings of the 16th European Conference on Cyber Warfare and Security …, 2017 | 174 | 2017 |
Flow-based network traffic generation using generative adversarial networks M Ring, D Schlör, D Landes, A Hotho Computers & Security 82, 156-172, 2019 | 105 | 2019 |
Creation of Flow-Based Data Sets for Intrusion Detection M Ring, S Wunderlich, D Grüdl, D Landes, A Hotho Journal of Information Warfare 16 (4), 40-53, 2017 | 53 | 2017 |
IP2Vec: Learning Similarities Between IP Addresses M Ring, A Dallmann, D Landes, A Hotho 2017 IEEE International Conference on Data Mining Workshops (ICDMW), 657-666, 2017 | 52 | 2017 |
Detection of slow port scans in flow-based network traffic M Ring, D Landes, A Hotho PloS one 13 (9), e0204507, 2018 | 39 | 2018 |
A toolset for intrusion and insider threat detection M Ring, S Wunderlich, D Grüdl, D Landes, A Hotho Data Analytics and Decision Support for Cybersecurity, 3-31, 2017 | 15 | 2017 |
Comparison of system call representations for intrusion detection S Wunderlich, M Ring, D Landes, A Hotho International Joint Conference: 12th International Conference on …, 2019 | 11 | 2019 |
ConDist: A Context-Driven Categorical Distance Measure M Ring, F Otto, M Becker, T Niebler, D Landes, A Hotho Machine Learning and Knowledge Discovery in Databases, 251-266, 2015 | 10 | 2015 |
Technical Report CIDDS-001 data set M Ring, S Wunderlich, D Gruedl, D Landes, A Hotho J. Inf. Warfare 13, 2017 | 9 | 2017 |
Evaluation of post-hoc XAI approaches through synthetic tabular data J Tritscher, M Ring, D Schlr, L Hettinger, A Hotho International symposium on methodologies for intelligent systems, 422-430, 2020 | 7 | 2020 |
inalu: Improved neural arithmetic logic unit D Schlör, M Ring, A Hotho Frontiers in Artificial Intelligence 3, 71, 2020 | 6 | 2020 |
Malware detection on windows audit logs using LSTMs M Ring, D Schlör, S Wunderlich, D Landes, A Hotho Computers & Security 109, 102389, 2021 | 4 | 2021 |
A presentation framework for programming in programing lectures M Ebert, M Ring 2016 IEEE Global Engineering Education Conference (EDUCON), 369-374, 2016 | 4 | 2016 |
Creation of specific flow-based training data sets for usage behaviour classification F Otto, M Ring, D Landes, A Hotho European Conference on Cyber Warfare and Security, 437, 2016 | 3 | 2016 |
Combination of statistical and semantic data sources for the improvement of software engineering courses (Vision Paper) M Koch, M Ring, F Otto, D Landes Educational Data Mining 2014, 2014 | 3 | 2014 |
The impact of different system call representations on intrusion detection S Wunderlich, M Ring, D Landes, A Hotho Logic Journal of the IGPL 30 (2), 239-251, 2022 | 2 | 2022 |
Impact of generative adversarial networks on netflow-based traffic classification M Wolf, M Ring, D Landes Computational Intelligence in Security for Information Systems Conference …, 2019 | 2 | 2019 |
Automatic Threshold Calculation for the Categorical Distance Measure ConDist. M Ring, D Landes, A Hotho LWA, 52-63, 2015 | 1 | 2015 |
On Learning Hierarchical Embeddings from Encrypted Network Traffic N Wehner, M Ring, J Schüler, A Hotho, T Hoßfeld, M Seufert NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, 1-7, 2022 | | 2022 |