If you made any changes in Pure these will be visible here soon.

Personal profile

Ancillary activities

No ancillary activities

Ancillary activities are updated daily

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 1 Similar Profiles
Intrusion detection Engineering & Materials Science
Servers Engineering & Materials Science
Recovery Mathematics
Attack Mathematics
Information use Engineering & Materials Science
Monitoring Engineering & Materials Science
Cloud computing Engineering & Materials Science
Granularity Mathematics

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2012 2016

  • 5 Conference contribution

Slick: An Intrusion Detection System for Virtualized Storage Devices

Bacs, A., Giuffrida, C., Grill, B. & Bos, H. J. 2016 Proceedings of the 31st Annual ACM Symposium on Applied Computing, Pisa, Italy, April 4-8, 2016. Ossowski, S. (ed.). ACM, p. 2033-2040

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Intrusion detection
Servers
Monitoring
Cloud computing
Consolidation

"Nice Boots" - A Large-Scale Analysis of Bootkits and New Ways to Stop Them

Grill, B., Bacs, A., Platzer, C. & Bos, H. J. 2015 Proceedings of DIMVA'2015.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data structure archaeology: scrape away the dirt and glue back the pieces! (Or: automated techniques to recover split and merged variables)

Slowinska, J. M., Haller, I., Bacs, A., Baranga, S. & Bos, H. J. 2014 Proceedings of the 11th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

System-level support for intrusion recovery

Bacs, A., Vermeulen, R., Slowinska, A. & Bos, H. 5 Apr 2013 Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, DIMVA 2012, Revised Selected Papers. Vol. 7591 LNCS, p. 144-163 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7591 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Recovery
Attack
Information use
Granularity
Data storage equipment

System-level Support for Intrusion Recovery

Bacs, A., Vermeulen, R., Slowinska, J. M. & Bos, H. J. 2012 DIMVA'12. Herkalion, Greece

Research output: Chapter in Book/Report/Conference proceedingConference contribution