Max Landauer
Orcid: 0000-0003-3813-3151
According to our database1,
Max Landauer
authored at least 39 papers
between 2017 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
A review of time-series analysis for cyber security analytics: from intrusion detection to attack prediction.
Int. J. Inf. Sec., February, 2025
2024
Analysis of statistical properties of variables in log data for advanced anomaly detection in cyber security.
Comput. Secur., February, 2024
A Critical Review of Common Log Data Sets Used for Evaluation of Sequence-Based Anomaly Detection Techniques.
Proc. ACM Softw. Eng., 2024
Red Team Redemption: A Structured Comparison of Open-Source Tools for Adversary Emulation.
CoRR, 2024
A logging maturity and decision model for the selection of intrusion detection cyber security solutions.
Comput. Secur., 2024
Proceedings of the 17th Cyber Security Experimentation and Test Workshop, 2024
NEWSROOM: Towards Automating Cyber Situational Awareness Processes and Tools for Cyber Defence.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
On the Application of Natural Language Processing for Advanced OSINT Analysis in Cyber Defence.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
DTRAP, 2023
Towards Detecting Anomalies in Log-Event Sequences with Deep Learning: Open Research Challenges.
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023
2022
Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation.
Proceedings of the Cybersecurity of Digital Service Chains, 2022
Proceedings of the Cybersecurity of Digital Service Chains, 2022
Dealing with Security Alert Flooding: Using Machine Learning for Domain-independent Alert Aggregation.
ACM Trans. Priv. Secur., 2022
IEEE Secur. Priv., 2022
IEEE Secur. Priv., 2022
Kyoushi Testbed Environment: A Model-driven Simulation Framework to Generate Open Log Data Sets for Security Evaluations.
ERCIM News, 2022
Strategic selection of data sources for cyber attack detection in enterprise networks: a survey and approach.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022
A Framework for Automatic Labeling of Log Datasets from Model-driven Testbeds for HIDS Evaluation.
Proceedings of the Sat-CPS@CODASPY 2022: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2022
A User and Entity Behavior Analytics Log Data Set for Anomaly Detection in Cloud Computing.
Proceedings of the IEEE International Conference on Big Data, 2022
2021
Have it Your Way: Generating Customized Log Datasets With a Model-Driven Simulation Testbed.
IEEE Trans. Reliab., 2021
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
IEEE Secur. Priv., 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Springer, ISBN: 978-3-030-74449-6, 2021
2020
synERGY: Cross-correlation of operational and contextual data to timely detect and mitigate attacks to cyber-physical systems.
J. Inf. Secur. Appl., 2020
ERCIM News, 2020
Comput. Secur., 2020
Have It Your Way: Generating Customized Log Data Sets with a Model-driven Simulation Testbed.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Creating Character-based Templates for Log Data to Enable Security Event Classification.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
INDICÆTING - Automatically Detecting, Extracting, and Correlating Cyber Threat Intelligence from Raw Computer Log Data.
ERCIM News, 2019
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2018
Dynamic log file analysis: An unsupervised cluster evolution approach for anomaly detection.
Comput. Secur., 2018
Proceedings of the Information Security Practice and Experience, 2018
2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017