Seguir
Sebastian Eresheim
Sebastian Eresheim
Dirección de correo verificada de fhstp.ac.at - Página principal
Título
Citado por
Citado por
Año
Exploring artificial intelligence for applications of drones in forest ecology and management
A Buchelt, A Adrowitzer, P Kieseberg, C Gollob, A Nothdurft, S Eresheim, ...
Forest Ecology and Management 551, 121530, 2024
662024
Towards Resilient Artificial Intelligence: Survey and Research Issues
O Eigner, S Eresheim, P Kieseberg, LD Klausner, M Pirker, T Priebe, ...
2021 IEEE International Conference on Cyber Security and Resilience (CSR …, 2021
332021
The Evolution of Process Hiding Techniques in Malware-Current Threats and Possible Countermeasures
S Eresheim, R Luh, S Schrittwieser
Journal of Information Processing 25, 866-874, 2017
282017
PenQuest Reloaded: A Digital Cyber Defense Game for Technical Education
R Luh, S Eresheim, S Größbacher, T Petelin, F Mayr, P Tavolato, ...
2022 IEEE Global Engineering Education Conference (EDUCON), 906-914, 2022
162022
On the impact of kernel code vulnerabilities in IoT devices
S Eresheim, R Luh, S Schrittwieser
2017 International Conference on Software Security and Assurance (ICSSA), 1-5, 2017
72017
Autocatalytic Sets and Assembly Theory: A Toy Model Perspective
S Raubitzek, A Schatten, P König, E Marica, S Eresheim, K Mallinger
Entropy 26 (9), 808, 2024
52024
Quantifying the Odds in Real World Attack Scenarios
P Tavolato, R Luh, S Eresheim, S Gmeiner, S Schrittwieser
2024 IEEE International Conference on Cyber Security and Resilience (CSR …, 2024
12024
Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process.
P Tavolato, R Luh, S Eresheim, S Gmeiner, S Schrittwieser
ICISSP, 211-218, 2024
12024
Formalizing Real-world Threat Scenarios.
P Tavolato, R Luh, S Eresheim
ICISSP, 281-289, 2022
12022
Anomaly Detection Support Using Process Classification
S Eresheim, LD Klausner, P Kochberger
2019 International Conference on Software Security and Assurance (ICSSA), 27-40, 2019
12019
Gamifying information security: Adversarial risk exploration for IT/OT infrastructures
R Luh, S Eresheim, P Tavolato, T Petelin, S Gmeiner, A Holzinger, ...
Computers & Security 151, 104287, 2025
2025
Bridging the Gap: Conceptual Modeling and Machine Learning for Web Portals
AB Dadhichi Shukla, Eugen Lindorfer, Sebastian Eresheim
Advances in Conceptual Modeling, 107-116, 2023
2023
Standing Still Is Not an Option: Alternative Baselines for Attainable Utility Preservation
S Eresheim, F Kovac, A Adrowitzer
International Cross-Domain Conference for Machine Learning and Knowledge …, 2023
2023
PenQuest: IT-Sicherheit als Lehrspiel (Interaktives Format)
R Luh, T Petelin, S Eresheim, S Gmeiner
2023
A Game Theoretic Analysis of Cyber Threats.
P Tavolato, R Luh, S Eresheim
ICISSP, 706-713, 2023
2023
Self-propagating Malware Containment via Reinforcement Learning
S Eresheim, D Pasterk
Machine Learning and Knowledge Extraction: 5th IFIP TC 5, TC 12, WG 8.4, WG …, 2021
2021
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–16