Exploring artificial intelligence for applications of drones in forest ecology and management A Buchelt, A Adrowitzer, P Kieseberg, C Gollob, A Nothdurft, S Eresheim, ... Forest Ecology and Management 551, 121530, 2024 | 66 | 2024 |
Towards Resilient Artificial Intelligence: Survey and Research Issues O Eigner, S Eresheim, P Kieseberg, LD Klausner, M Pirker, T Priebe, ... 2021 IEEE International Conference on Cyber Security and Resilience (CSR …, 2021 | 33 | 2021 |
The Evolution of Process Hiding Techniques in Malware-Current Threats and Possible Countermeasures S Eresheim, R Luh, S Schrittwieser Journal of Information Processing 25, 866-874, 2017 | 28 | 2017 |
PenQuest Reloaded: A Digital Cyber Defense Game for Technical Education R Luh, S Eresheim, S Größbacher, T Petelin, F Mayr, P Tavolato, ... 2022 IEEE Global Engineering Education Conference (EDUCON), 906-914, 2022 | 16 | 2022 |
On the impact of kernel code vulnerabilities in IoT devices S Eresheim, R Luh, S Schrittwieser 2017 International Conference on Software Security and Assurance (ICSSA), 1-5, 2017 | 7 | 2017 |
Autocatalytic Sets and Assembly Theory: A Toy Model Perspective S Raubitzek, A Schatten, P König, E Marica, S Eresheim, K Mallinger Entropy 26 (9), 808, 2024 | 5 | 2024 |
Quantifying the Odds in Real World Attack Scenarios P Tavolato, R Luh, S Eresheim, S Gmeiner, S Schrittwieser 2024 IEEE International Conference on Cyber Security and Resilience (CSR …, 2024 | 1 | 2024 |
Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process. P Tavolato, R Luh, S Eresheim, S Gmeiner, S Schrittwieser ICISSP, 211-218, 2024 | 1 | 2024 |
Formalizing Real-world Threat Scenarios. P Tavolato, R Luh, S Eresheim ICISSP, 281-289, 2022 | 1 | 2022 |
Anomaly Detection Support Using Process Classification S Eresheim, LD Klausner, P Kochberger 2019 International Conference on Software Security and Assurance (ICSSA), 27-40, 2019 | 1 | 2019 |
Gamifying information security: Adversarial risk exploration for IT/OT infrastructures R Luh, S Eresheim, P Tavolato, T Petelin, S Gmeiner, A Holzinger, ... Computers & Security 151, 104287, 2025 | | 2025 |
Bridging the Gap: Conceptual Modeling and Machine Learning for Web Portals AB Dadhichi Shukla, Eugen Lindorfer, Sebastian Eresheim Advances in Conceptual Modeling, 107-116, 2023 | | 2023 |
Standing Still Is Not an Option: Alternative Baselines for Attainable Utility Preservation S Eresheim, F Kovac, A Adrowitzer International Cross-Domain Conference for Machine Learning and Knowledge …, 2023 | | 2023 |
PenQuest: IT-Sicherheit als Lehrspiel (Interaktives Format) R Luh, T Petelin, S Eresheim, S Gmeiner | | 2023 |
A Game Theoretic Analysis of Cyber Threats. P Tavolato, R Luh, S Eresheim ICISSP, 706-713, 2023 | | 2023 |
Self-propagating Malware Containment via Reinforcement Learning S Eresheim, D Pasterk Machine Learning and Knowledge Extraction: 5th IFIP TC 5, TC 12, WG 8.4, WG …, 2021 | | 2021 |