Marian Gawron

According to our database1, Marian Gawron authored at least 12 papers between 2013 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Towards automated advanced vulnerability analysis.
PhD thesis, 2019

2017
Evaluation of in-memory storage engine for machine learning analysis of security events.
Concurr. Comput. Pract. Exp., 2017

Automatic Vulnerability Classification Using Machine Learning.
Proceedings of the Risks and Security of Internet and Systems, 2017

2015
Automatic vulnerability detection for weakness visualization and advisory creation.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

Simulation user behavior on a security testbed using user behavior states graph.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

Poisson-Based Anomaly Detection for Identifying Malicious User Behaviour.
Proceedings of the Mobile, Secure, and Programmable Networking, 2015

Leveraging Event Structure for Adaptive Machine Learning on Big Data Landscapes.
Proceedings of the Mobile, Secure, and Programmable Networking, 2015

High-Speed Security Analytics Powered by In-Memory Machine Learning Engine.
Proceedings of the 14th International Symposium on Parallel and Distributed Computing, 2015

Analyzing Boundary Device Logs on the In-memory Platform.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Automatic detection of vulnerabilities for advanced security analytics.
Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, 2015

2013
CGA integration into IPsec/IKEv2 authentication.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Hierarchical object log format for normalisation of security events.
Proceedings of the 9th International Conference on Information Assurance and Security, 2013


  Loading...