Name
Affiliation
Papers
TANJA ZSEBY
Institute of Telecommunications,Vienna University of Technology,Wien,Österreich
85
Collaborators
Citations 
PageRank 
119
199
36.35
Referers 
Referees 
References 
519
1380
604
Search Limit
1001000
Title
Citations
PageRank
Year
Subverting Counter Mode Encryption for Hidden Communication in High-Security Infrastructures00.342021
SecTULab: A Moodle-Integrated Secure Remote Access Architecture for Cyber Security Laboratories00.342021
Explainability and Adversarial Robustness for RNNs20.412020
Cross-Layer Profiling of Encrypted Network Data for Anomaly Detection00.342020
SparseIDS: Learning Packet Sampling with Reinforcement Learning00.342020
Interpretability and Refinement of Clustering00.342020
MDCStream: Stream Data Generator for Testing Analysis Algorithms00.342020
SDOstream - Low-Density Models for Streaming Outlier Detection.00.342020
Anomaly Detection for Mixed Packet Sequences00.342020
LFQ: Online Learning of Per-flow Queuing Policies using Deep Reinforcement Learning00.342020
Absolute Cluster Validity30.392020
EagerNet: Early Predictions of Neural Networks for Computationally Efficient Intrusion Detection00.342020
Why are My Flows Different? A Tutorial on Flow Exporters00.342020
Are Network Attacks Outliers? A Study of Space Representations and Unsupervised Algorithms.00.342019
BeaconBlocks: Augmenting Proof-of-Stake with On-Chain Time Synchronization10.632019
MDCGen: Multidimensional Dataset Generator for Clustering30.402019
Fuzzy classification boundaries against adversarial network attacks10.352019
Rax: Deep Reinforcement Learning for Congestion Control20.372019
Malware propagation in smart grid networks: metrics, simulation and comparison of three malware types00.342019
Cocoa - Congestion Control Aware Queuing.00.342019
Pattern Discovery in Internet Background Radiation10.352019
Walling up Backdoors in Intrusion Detection Systems.10.362019
Outlier Detection Based On Low Density Models10.352018
ChainChannels: Private Botnet Communication Over Public Blockchains10.402018
Malware propagation in smart grid monocultures.00.342018
Subliminal Channels in High-Speed Signatures.00.342018
Cyber-Physical Systems - Security.00.342018
Encryption is Futile: Delay Attacks on High-Precision Clock Synchronization.00.342018
Network-Based Secret Communication in Clouds: A Survey.20.372017
Are Network Covert Timing Channels Statistical Anomalies?00.342017
A Meta-Analysis Approach for Feature Selection in Network Traffic Research60.602017
The FUSE testbed: establishing a microgrid for smart grid security experiments.00.342017
A Subliminal Channel in EdDSA: Information Leakage with High-Speed Signatures.00.342017
Toggle MUX: How X-Optimism Can Lead to Malicious Hardware.00.342017
SecureTime: Secure Multicast Time Synchronization.10.402017
Attack Models for Advanced Persistent Threats in Smart Grid Wide Area Monitoring10.352017
Botnet Communication Patterns.80.522017
Detection and mitigation of cascading failures in interconnected power systems00.342017
Decision Tree Rule Induction for Detecting Covert Timing Channels in TCP/IP Traffic.00.342017
A Network Steganography Lab on Detecting TCP/IP Covert Channels.50.532016
Teaching Network Security With IP Darkspace Data50.622016
Data Integrity Attacks in Smart Grid Wide Area Monitoring.10.372016
Time-activity footprints in IP traffic.30.382016
The Right Time: Reducing Effective End-to-End Delay in Time-Slotted Packet-Switched Networks20.382016
DAT detectors: uncovering TCP/IP covert channels by descriptive analytics.10.352016
Resilience and Security: A Qualitative Survey of Urban Smart Grid Architectures.40.562016
Big-DAMA: Big Data Analytics for Network Traffic Monitoring and Analysis.10.402016
Analysis of network traffic features for anomaly detection240.902015
Entropy-Based Characterization of Internet Background Radiation.10.342015
Representative Delay Measurements (RDM): Facing the Challenge of Modern Networks.10.372015
  • 1
  • 2