Wim Mees

Orcid: 0000-0002-0696-8093

According to our database1, Wim Mees authored at least 30 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SoK: A Comparison of Autonomous Penetration Testing Agents.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

Evaluation of Cyber Situation Awareness - Theory, Techniques and Applications.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Adv-Bot: Realistic adversarial botnet attacks against network intrusion detection systems.
Comput. Secur., June, 2023

TAD: Transfer learning-based multi-adversarial detection of evasion attacks against network intrusion detection systems.
Future Gener. Comput. Syst., 2023

Review on the Feasibility of Adversarial Evasion Attacks and Defenses for Network Intrusion Detection Systems.
CoRR, 2023

Detection of Previously Unknown Advanced Persistent Threats Through Visual Analytics with the MASFAD Framework.
Proceedings of the International Conference on Military Communications and Information Systems, 2023

2022
Sector-Specific Training - A Federated Maritime Scenario.
Proceedings of the Multimedia Communications, Services and Security, 2022

Leveraging Cyber Ranges for Prototyping, Certification and Training: The ECHO case.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

2021
Adversarial Training for Deep Learning-based Intrusion Detection Systems.
CoRR, 2021

Efficient Intrusion Detection Using Evidence Theory.
CoRR, 2021

Maximum Entropy Networks Applied on Twitter Disinformation Datasets.
Proceedings of the Complex Networks & Their Applications X - Volume 2, Proceedings of the Tenth International Conference on Complex Networks and Their Applications COMPLEX NETWORKS 2021, Madrid, Spain, November 30, 2021

Detect & Reject for Transferability of Black-Box Adversarial Attacks Against Network Intrusion Detection Systems.
Proceedings of the Advances in Cyber Security - Third International Conference, 2021

2019
Building a Cyber Range for training CyberDefense Situation Awareness.
Proceedings of the International Conference on Military Communications and Information Systems, 2019

Training a multi-criteria decision system and application to the detection of PHP webshells.
Proceedings of the International Conference on Military Communications and Information Systems, 2019

2018
A comparative analysis of visualisation techniques to achieve cyber situational awareness in the military.
Proceedings of the International Conference on Military Communications and Information Systems, 2018

Graph-based APT detection.
Proceedings of the International Conference on Military Communications and Information Systems, 2018

2017
Recommendations for Model-Driven Paradigms for Integrated Approaches to Cyber Defense.
CoRR, 2017

2016
Fast Online k-nn Graph Building.
CoRR, 2016

Fast distributed k-nn graph update.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

2015
An attempt at defining cyberdefense situation awareness in the context of command & control.
Proceedings of the International Conference on Military Communications and Information Systems, 2015

2014
Scalable Graph Building from Text Data.
Proceedings of the 3rd International Workshop on Big Data, 2014

Multi-agent System for APT Detection.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

Determining the k in k-means with MapReduce.
Proceedings of the Workshops of the EDBT/ICDT 2014 Joint Conference (EDBT/ICDT 2014), 2014

Building k-nn graphs from large text data.
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014

2010
On a multicriteria clustering approach for attack attribution.
SIGKDD Explor., 2010

2009
Virtual Language Framework (VLF) - A Semantic Abstraction Layer.
Proceedings of the WEBIST 2009, 2009

Addressing the attack attribution problem using knowledge discovery and multi-criteria fuzzy decision-making.
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, 2009

2007
Risk management in coalition networks.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2000
Application aux images satellitaires multi spectrales, haute résolution.
PhD thesis, 2000

1998
Advances in Computer Assisted Image Interpretation.
Informatica (Slovenia), 1998


  Loading...