Sebastian Eresheim

Orcid: 0000-0001-7620-8391

According to our database1, Sebastian Eresheim authored at least 15 papers between 2017 and 2025.

Collaborative distances:

Timeline

2017
2018
2019
2020
2021
2022
2023
2024
2025
0
1
2
3
4
1
1
1
1
2
3
2
2
1
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Gamifying information security: Adversarial risk exploration for IT/OT infrastructures.
Comput. Secur., 2025

2024
Autocatalytic Sets and Assembly Theory: A Toy Model Perspective.
Entropy, September, 2024

Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

Quantifying the Odds in Real World Attack Scenarios.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

2023
A Game Theoretic Analysis of Cyber Threats.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Bridging the Gap: Conceptual Modeling and Machine Learning for Web Portals.
Proceedings of the Advances in Conceptual Modeling, 2023

Standing Still Is Not an Option: Alternative Baselines for Attainable Utility Preservation.
Proceedings of the Machine Learning and Knowledge Extraction, 2023

2022
PenQuest: Gamifying Cyberattacks.
ERCIM News, 2022

Formalizing Real-world Threat Scenarios.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

PenQuest Reloaded: A Digital Cyber Defense Game for Technical Education.
Proceedings of the IEEE Global Engineering Education Conference, 2022

2021
Towards Resilient Artificial Intelligence: Survey and Research Issues.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

Self-propagating Malware Containment via Reinforcement Learning.
Proceedings of the Machine Learning and Knowledge Extraction, 2021

2019
Anomaly Detection Support Using Process Classification.
Proceedings of the International Conference on Software Security and Assurance, 2019

2017
The Evolution of Process Hiding Techniques in Malware - Current Threats and Possible Countermeasures.
J. Inf. Process., 2017

On the Impact of Kernel Code Vulnerabilities in IoT Devices.
Proceedings of the International Conference on Software Security and Assurance, 2017


  Loading...