CySecBERT: A Domain-Adapted Language Model for the Cybersecurity Domain M Bayer, P Kuehn, R Shanehsaz, C Reuter ACM Transactions on Privacy and Security 27 (2), 1-20, 2024 | 47 | 2024 |
OVANA: An approach to analyze and improve the information quality of vulnerability databases P Kuehn, M Bayer, M Wendelborn, C Reuter Proceedings of the 16th International Conference on Availability …, 2021 | 30 | 2021 |
Cysecalert: An alert generation system for cyber security events using open source intelligence data T Riebe, T Wirth, M Bayer, P Kühn, MA Kaufhold, V Knauthe, S Guthe, ... International Conference on Information and Communications Security, 429-446, 2021 | 29 | 2021 |
Common vulnerability scoring system prediction based on open source intelligence information sources P Kühn, DN Relke, C Reuter Computers & Security 131, 103286, 2023 | 27 | 2023 |
Help wanted-challenges in data collection, analysis and communication of cyber threats in security operation centers AS Basyurt, J Fromm, P Kuehn, MA Kaufhold, M Mirbabaie | 15 | 2022 |
US security policy: The dual-use regulation of cryptography and its effects on surveillance T Riebe, P Kühn, P Imperatori, C Reuter European Journal for Security Research 7 (1), 39-65, 2022 | 10 | 2022 |
CYWARN: Strategy and technology development for cross-platform cyber situational awareness and actor-specific cyber threat communication MA Kaufhold, J Fromm, T Riebe, M Mirbabaie, P Kuehn, AS Basyurt, ... Mensch und Computer 2021-Workshopband, 10.18420/muc2021-mci-ws08-263, 2021 | 9 | 2021 |
Sharing of cyber threat intelligence between states P Kuehn, T Riebe, L Apelt, M Jansen, C Reuter Sicherheit und Frieden (S+ F)/Security and Peace 38 (1), 22-28, 2020 | 9 | 2020 |
Towards resilient critical infrastructures–motivating users to contribute to smart grid resilience R Egert, N Gerber, J Haunschild, P Kuehn, V Zimmermann i-com 20 (2), 161-175, 2021 | 5 | 2021 |
Threatcrawl: A bert-based focused crawler for the cybersecurity domain P Kuehn, M Schmidt, M Bayer, C Reuter arXiv e-prints, arXiv: 2304.11960, 2023 | 4 | 2023 |
Navigating the shadows: Manual and semi-automated evaluation of the dark web for cyber threat intelligence P Kühn, K Wittorf, C Reuter IEEE Access, 2024 | 3 | 2024 |
ExTRUST: Reducing Exploit Stockpiles With a Privacy-Preserving Depletion System for Inter-State Relationships T Reinhold, P Kuehn, D Günther, T Schneider, C Reuter IEEE Transactions on Technology and Society 4 (2), 158-170, 2023 | 3 | 2023 |
Clustering of threat information to mitigate information overload for computer emergency response teams P Kuehn, M Kerk, M Wendelborn, C Reuter arXiv preprint arXiv 2210, 2022 | 3 | 2022 |
The Notion of Relevance in Cybersecurity: A Categorization of Security Tools and Deduction of Relevance Notions P Kuehn, J Bäumler, MA Kaufhold, M Wendelborn, C Reuter Mensch und Computer 2022-Workshopband, 10.18420/muc2022-mci-ws01-220, 2022 | 2 | 2022 |
Bandit on the Hunt: Dynamic Crawling for Cyber Threat Intelligence P Kuehn, D Nadermahmoodi, M Bayer, C Reuter arXiv preprint arXiv:2304.11960, 2023 | | 2023 |
Common Vulnerability Scoring System Prediction Based on Open Source Intelligence Information Sources [Data Set & Models] P Kuehn, D Relke, C Reuter | | 2023 |
ThreatCluster: Threat Clustering for Information Overload Reduction in Computer Emergency Response Teams P Kuehn, D Nadermahmoodi, M Bayer, C Reuter arXiv preprint arXiv:2210.14067, 2022 | | 2022 |
MOBILE RESILIENCE: Designing Mobile Interactive Systems for Societal and Technical Resilience C Reuter, VPDMA Kaufhold, T Riebe, IS Linsner, IK Hartwig, T Reinhold, ... | | |