Explainability in Cyber-Security using Complex Network Analysis: A Brief Methodological Overview. Atzmuller, M. & Kanawati, R. In Proceeding of European Interdisciplinary Cybersecurity Conference (EICC), Barcelona, June, 2022.
Paper bibtex 1 download @inproceedings{A3:AtzmullerKEICC2022,
address = {Barcelona},
author = {Martin Atzmuller and Rushed Kanawati},
booktitle = {Proceeding of European Interdisciplinary Cybersecurity Conference (EICC)},
date-modified = {2023-09-27 22:20:58 +0200},
month = jun,
ranking = {intc},
title = {Explainability in Cyber-Security using Complex Network Analysis: A Brief Methodological Overview},
url = {https://dl.acm.org/doi/10.1145/3528580.3532839},
year = {2022},
bdsk-url-1 = {https://dl.acm.org/doi/10.1145/3528580.3532839}}
Downloads: 1
{"_id":"9N4WRuTyT6TYtzios","bibbaseid":"atzmuller-kanawati-explainabilityincybersecurityusingcomplexnetworkanalysisabriefmethodologicaloverview-2022","author_short":["Atzmuller, M.","Kanawati, R."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","address":"Barcelona","author":[{"firstnames":["Martin"],"propositions":[],"lastnames":["Atzmuller"],"suffixes":[]},{"firstnames":["Rushed"],"propositions":[],"lastnames":["Kanawati"],"suffixes":[]}],"booktitle":"Proceeding of European Interdisciplinary Cybersecurity Conference (EICC)","date-modified":"2023-09-27 22:20:58 +0200","month":"June","ranking":"intc","title":"Explainability in Cyber-Security using Complex Network Analysis: A Brief Methodological Overview","url":"https://dl.acm.org/doi/10.1145/3528580.3532839","year":"2022","bdsk-url-1":"https://dl.acm.org/doi/10.1145/3528580.3532839","bibtex":"@inproceedings{A3:AtzmullerKEICC2022,\n\taddress = {Barcelona},\n\tauthor = {Martin Atzmuller and Rushed Kanawati},\n\tbooktitle = {Proceeding of European Interdisciplinary Cybersecurity Conference (EICC)},\n\tdate-modified = {2023-09-27 22:20:58 +0200},\n\tmonth = jun,\n\tranking = {intc},\n\ttitle = {Explainability in Cyber-Security using Complex Network Analysis: A Brief Methodological Overview},\n\turl = {https://dl.acm.org/doi/10.1145/3528580.3532839},\n\tyear = {2022},\n\tbdsk-url-1 = {https://dl.acm.org/doi/10.1145/3528580.3532839}}\n\n","author_short":["Atzmuller, M.","Kanawati, R."],"key":"A3:AtzmullerKEICC2022","id":"A3:AtzmullerKEICC2022","bibbaseid":"atzmuller-kanawati-explainabilityincybersecurityusingcomplexnetworkanalysisabriefmethodologicaloverview-2022","role":"author","urls":{"Paper":"https://dl.acm.org/doi/10.1145/3528580.3532839"},"metadata":{"authorlinks":{}},"downloads":1,"html":""},"bibtype":"inproceedings","biburl":"http://lipn.fr/~kanawati/rk.bib","dataSources":["fGNYz4u523EGALSNJ","f3sSzx9RAGbacNjxm","N73cbym6yGpirSQgi"],"keywords":[],"search_terms":["explainability","cyber","security","using","complex","network","analysis","brief","methodological","overview","atzmuller","kanawati"],"title":"Explainability in Cyber-Security using Complex Network Analysis: A Brief Methodological Overview","year":2022,"downloads":1}