Cited By
View all- Empl PSchlette DStöger LPernul G(2024)Generating ICS vulnerability playbooks with open standardsInternational Journal of Information Security10.1007/s10207-023-00760-523:2(1215-1230)Online publication date: 1-Apr-2024
- Preuveneers DJoosen W(2023)Privacy-preserving correlation of cross-organizational cyber threat intelligence with private graph intersectionsComputers and Security10.1016/j.cose.2023.103505135:COnline publication date: 1-Dec-2023
- Papanikolaou AAlevizopoulos AIlioudis CDemertzis KRantos K(2023)An autoML network traffic analyzer for cyber threat detectionInternational Journal of Information Security10.1007/s10207-023-00703-022:5(1511-1530)Online publication date: 21-May-2023
- Show More Cited By