Insider threat detection study M Kont, M Pihelgas, J Wojtkowiak, L Trinberg, AM Osula NATO CCD COE, Tallinn, 2015 | 49 | 2015 |
An unsupervised framework for detecting anomalous messages from syslog log files R Vaarandi, B Blumbergs, M Kont NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-6, 2018 | 47 | 2018 |
Event log analysis with the LogCluster tool R Vaarandi, M Kont, M Pihelgas MILCOM 2016-2016 IEEE Military Communications Conference, 982-987, 2016 | 33 | 2016 |
Creating and detecting IPv6 transition mechanism-based information exfiltration covert channels B Blumbergs, M Pihelgas, M Kont, O Maennel, R Vaarandi Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finland …, 2016 | 19 | 2016 |
Initial reference architecture of an intelligent autonomous agent for cyber defense A Kott, P Therón, LV Mancini, M Drašar, E Dushku, G Heiko, M Kont, ... | 13 | 2018 |
Frankenstack: Toward real-time red team feedback M Kont, M Pihelgas, K Maennel, B Blumbergs, T Lepik MILCOM 2017-2017 ieee military communications conference (milcom), 400-405, 2017 | 12 | 2017 |
Toward intelligent autonomous agents for cyber defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152-RTG A Kott, R Thomas, M Drašar, M Kont, A Poylisher, B Blakely, P Theron, ... arXiv preprint arXiv:1804.07646, 2018 | 8 | 2018 |
Frankenstack: Real-time cyberattack detection and feedback system for technical cyber exercises M Pihelgas, M Kont 2021 IEEE International Conference on Cyber Security and Resilience (CSR …, 2021 | 6 | 2021 |
IDS for logs: Towards implementing a streaming Sigma rule engine M Kont, M Pihelgas NATO CCD COE Publications, 2020 | 2 | 2020 |
Initial Reference Architecture of an Intelligent Autonomous Agent for Cyber Defense Autonomous Intelligent Cyber-defense Agent (AICA) Reference Architecture. Release 2.0 A Kott, L Mancini, P Théron, M Drašar, E Dushku, H Günther, M Kont, ... | 1 | 2020 |
Event Management and active defense framework for small companies M Kont Tallinn, 2014 | 1 | 2014 |
Anomalous Messages from Syslog Log Files R Vaarandi, B Blumbergs, M Kont | | 2018 |
Hedgehog in the Fog: Creating and Detecting IPv6 Transition Mechanism-Based Information Exfiltration Covert Channels B Blumbergs, B Blumbergs, Maunas. 0 Pihelgas, M Kont, ... CCDCOE, NATO Cooperative Cyber Defence Centre of Excellence, 2016 | | 2016 |