Markus Kont
Markus Kont
NATO CCDCOE, Tallinn University of Technology
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Insider threat detection study
M Kont, M Pihelgas, J Wojtkowiak, L Trinberg, AM Osula
NATO CCD COE, Tallinn, 2015
An unsupervised framework for detecting anomalous messages from syslog log files
R Vaarandi, B Blumbergs, M Kont
NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-6, 2018
Event log analysis with the LogCluster tool
R Vaarandi, M Kont, M Pihelgas
MILCOM 2016-2016 IEEE Military Communications Conference, 982-987, 2016
Creating and detecting IPv6 transition mechanism-based information exfiltration covert channels
B Blumbergs, M Pihelgas, M Kont, O Maennel, R Vaarandi
Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finland …, 2016
Initial reference architecture of an intelligent autonomous agent for cyber defense
A Kott, P Therón, LV Mancini, M Drašar, E Dushku, G Heiko, M Kont, ...
Frankenstack: Toward real-time red team feedback
M Kont, M Pihelgas, K Maennel, B Blumbergs, T Lepik
MILCOM 2017-2017 ieee military communications conference (milcom), 400-405, 2017
Toward intelligent autonomous agents for cyber defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152-RTG
A Kott, R Thomas, M Drašar, M Kont, A Poylisher, B Blakely, P Theron, ...
arXiv preprint arXiv:1804.07646, 2018
Frankenstack: Real-time cyberattack detection and feedback system for technical cyber exercises
M Pihelgas, M Kont
2021 IEEE International Conference on Cyber Security and Resilience (CSR …, 2021
IDS for logs: Towards implementing a streaming Sigma rule engine
M Kont, M Pihelgas
NATO CCD COE Publications, 2020
Initial Reference Architecture of an Intelligent Autonomous Agent for Cyber Defense Autonomous Intelligent Cyber-defense Agent (AICA) Reference Architecture. Release 2.0
A Kott, L Mancini, P Théron, M Drašar, E Dushku, H Günther, M Kont, ...
Event Management and active defense framework for small companies
M Kont
Tallinn, 2014
Anomalous Messages from Syslog Log Files
R Vaarandi, B Blumbergs, M Kont
Hedgehog in the Fog: Creating and Detecting IPv6 Transition Mechanism-Based Information Exfiltration Covert Channels
B Blumbergs, B Blumbergs, Maunas. 0 Pihelgas, M Kont, ...
CCDCOE, NATO Cooperative Cyber Defence Centre of Excellence, 2016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–13