Photo of Egon Kidmose
  • Fredrik Bajers Vej 7, A4-209

    9220 Aalborg Ø

    Denmark

20162019
If you made any changes in Pure these will be visible here soon.

Research Output 2016 2019

2019
126 Downloads (Pure)

Network-based detection of malicious activities - a corporate network perspective

Kidmose, E., 2019, Aalborg Universitetsforlag. 167 p. (Ph.d.-serien for Det Tekniske Fakultet for IT og Design, Aalborg Universitet).

Research output: Book/ReportPh.D. thesisResearch

Open Access
File
2018

Assessing usefulness of blacklists without the ground truth

Kidmose, E., Gausel, K., Brandbyge, S. & Pedersen, J. M., 2018, Image Processing and Communications Challenges 10. Springer, p. 216-223 8 p. (Advances in Intelligent Systems and Computing, Vol. 892).

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

Internet
1 Citation (Scopus)

Detection of malicious and abusive domain names

Kidmose, E., Lansing, E., Brandbyge, S. & Pedersen, J. M., 2018, 1st International Conference on Data Intelligence and Security - ICDIS. IEEE, p. 49-56 8 p.

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

Detection of malicious domains through lexical analysis

Kidmose, E., Stevanovic, M. & Pedersen, J. M., 2018, 2018 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security). IEEE, 5 p.

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

106 Downloads (Pure)

Heuristic methods for efficient identification of abusive domain names

Kidmose, E., Lansing, E., Brandbyge, S. & Pedersen, J. M., 2018, In : International Journal On Cyber Situational Awareness (IJCSA). 3, 1, p. 121-142 22 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
Heuristic methods
Profitability
Internet
Industry
87 Downloads (Pure)

Security in internet of things: Trends and challenges

Pedersen, J. M. & Kidmose, E., 2018, In : CEUR Workshop Proceedings. 2218, p. 182–188 7 p.

Research output: Contribution to journalConference article in JournalResearchpeer-review

Open Access
File
Washing machines
Watches
Artificial intelligence
Cameras
Internet
2017
2 Citations (Scopus)

On the Impact of Cyberattacks on Voltage Control Coordination by ReGen Plants in Smart Grids

Shahid, K., Kidmose, E., Olsen, R. L., Petersen, L. & Iov, F., 2017, IEEE International Conference on Smart Grid Communications (SmartGridComm 2017). IEEE, 6 p.

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

Voltage control
Wind power
Communication systems
Controllers
Communication

Security in Internet of Things

Kidmose, E. & Pedersen, J. M., 2017, Cybersecurity and Privacy : Bridging the Gap. Khajuria, S., Sørensen, L. & Skouby, K. E. (eds.). River Publishers, p. 99-118 19 p. (Wireless World Research Forum Series in Mobile Telecomunications).

Research output: Contribution to book/anthology/report/conference proceedingBook chapterResearchpeer-review

Electronic mail
Internet
Internet of things
Botnet
2016

Correlating intrusion detection alerts on bot malware infections using neural network

Kidmose, E., Stevanovic, M. & Pedersen, J. M., Jul 2016, Cyber Security And Protection Of Digital Services (Cyber Security), 2016 International Conference On. IEEE, 8 p. (International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). Proceedings.).

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

Intrusion detection
Neural networks
Feature extraction
Processing
Malware