Photo of Egon Kidmose
  • Fredrik Bajers Vej 7, A4-209

    9220 Aalborg Ø

    Denmark

20162019
If you made any changes in Pure these will be visible here soon.

Research Output 2016 2019

Filter
Article in proceeding
2018

Assessing usefulness of blacklists without the ground truth

Kidmose, E., Gausel, K., Brandbyge, S. & Pedersen, J. M., 2018, Image Processing and Communications Challenges 10. Springer, p. 216-223 8 p. (Advances in Intelligent Systems and Computing, Vol. 892).

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

Internet
1 Citation (Scopus)

Detection of malicious and abusive domain names

Kidmose, E., Lansing, E., Brandbyge, S. & Pedersen, J. M., 2018, 1st International Conference on Data Intelligence and Security - ICDIS. IEEE, p. 49-56 8 p.

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

Detection of malicious domains through lexical analysis

Kidmose, E., Stevanovic, M. & Pedersen, J. M., 2018, 2018 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security). IEEE, 5 p.

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

2017
2 Citations (Scopus)

On the Impact of Cyberattacks on Voltage Control Coordination by ReGen Plants in Smart Grids

Shahid, K., Kidmose, E., Olsen, R. L., Petersen, L. & Iov, F., 2017, IEEE International Conference on Smart Grid Communications (SmartGridComm 2017). IEEE, 6 p.

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

Voltage control
Wind power
Communication systems
Controllers
Communication
2016

Correlating intrusion detection alerts on bot malware infections using neural network

Kidmose, E., Stevanovic, M. & Pedersen, J. M., Jul 2016, Cyber Security And Protection Of Digital Services (Cyber Security), 2016 International Conference On. IEEE, 8 p. (International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). Proceedings.).

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

Intrusion detection
Neural networks
Feature extraction
Processing
Malware