Ulrich Bühler

According to our database1, Ulrich Bühler authored at least 13 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Membership Management in Collaborative Intrusion Detection Systems.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

Generative Pattern Dissemination for Collaborative Intrusion Detection.
Proceedings of the 6th Conference on Cloud and Internet of Things, 2023

2022
Privacy-Preserving Collaborative Intrusion Detection Systems: A Federated Learning Framework.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2022

2021
A Hierarchical Architecture and Probabilistic Strategy for Collaborative Intrusion Detection.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

2017
Feature selection for flow-based intrusion detection using Rough Set Theory.
Proceedings of the 14th IEEE International Conference on Networking, Sensing and Control, 2017

A new Attack Composition for Network Security.
Proceedings of the 10. DFN-Forum, 2017

2016
In-Database Feature Selection Using Rough Set Theory.
Proceedings of the Information Processing and Management of Uncertainty in Knowledge-Based Systems, 2016

2015
An In-Database Rough Set Toolkit.
Proceedings of the LWA 2015 Workshops: KDML, 2015

2014
Persistent dataset generation using real-time operative framework.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

A Comprehensive Model for Revealing Anomaly in Network Data Flow.
Proceedings of the 44. Jahrestagung der Gesellschaft für Informatik, Big Data, 2014

2013
An Enhanced GHSOM for IDS.
Proceedings of the IEEE International Conference on Systems, 2013

Reinforcing network security by converting massive data flow to continuous connections for IDS.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

2012
Mining Techniques in Network Security to Enhance Intrusion Detection Systems
CoRR, 2012


  Loading...