Robert Luh
Orcid: 0000-0001-6536-6706
According to our database1,
Robert Luh
authored at least 34 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
2022
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Proceedings of the IEEE Global Engineering Education Conference, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
PenQuest: a gamified attacker/defender meta model for cyber security assessment and education.
J. Comput. Virol. Hacking Tech., 2020
Advanced threat intelligence: detection and classification of anomalous behavior in system processes.
Elektrotech. Informationstechnik, 2020
2019
Advanced threat intelligence: interpretation of anomalous behavior in ubiquitous kernel processes.
PhD thesis, 2019
Comput. Secur., 2019
2018
J. Comput. Virol. Hacking Tech., 2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
J. Comput. Virol. Hacking Tech., 2017
The Evolution of Process Hiding Techniques in Malware - Current Threats and Possible Countermeasures.
J. Inf. Process., 2017
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017
Proceedings of the International Conference on Software Security and Assurance, 2017
Proceedings of the International Conference on Software Security and Assurance, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the 10th Forum Media Technology and 3rd All Around Audio Symposium, 2017
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017
2016
Proceedings of the 25th International Conference on World Wide Web, 2016
Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, 2016
2015
Proceedings of the 17th Eurographics Conference on Visualization, 2015
Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services, 2015
2014
Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis.
Proceedings of the 11th Workshop on Visualization for Cyber Security, 2014
Proceedings of the 8th IEEE International Symposium on Service Oriented System Engineering, 2014
Proceedings of the Ninth International Conference on Availability, 2014