CySecBERT: A Domain-Adapted Language Model for the Cybersecurity Domain M Bayer, P Kuehn, R Shanehsaz, C Reuter ACM Transactions on Privacy and Security 27 (2), 1-20, 2024 | 37 | 2024 |
Cysecalert: An alert generation system for cyber security events using open source intelligence data T Riebe, T Wirth, M Bayer, P Kühn, MA Kaufhold, V Knauthe, S Guthe, ... International Conference on Information and Communications Security, 429-446, 2021 | 28 | 2021 |
OVANA: An approach to analyze and improve the information quality of vulnerability databases P Kuehn, M Bayer, M Wendelborn, C Reuter Proceedings of the 16th International Conference on Availability …, 2021 | 28 | 2021 |
Common vulnerability scoring system prediction based on open source intelligence information sources P Kuehn, DN Relke, C Reuter Computers & Security 131, 103286, 2023 | 21 | 2023 |
Help wanted-challenges in data collection, analysis and communication of cyber threats in security operation centers AS Basyurt, J Fromm, P Kuehn, MA Kaufhold, M Mirbabaie | 14 | 2022 |
Sharing of cyber threat intelligence between states P Kuehn, T Riebe, L Apelt, M Jansen, C Reuter Sicherheit und Frieden (S+ F)/Security and Peace 38 (1), 22-28, 2020 | 10 | 2020 |
US Security Policy: The Dual-Use Regulation of Cryptography and its Effects on Surveillance T Riebe, P Kühn, P Imperatori, C Reuter European Journal for Security Research 7 (1), 39-65, 2022 | 9 | 2022 |
CYWARN: Strategy and technology development for cross-platform cyber situational awareness and actor-specific cyber threat communication MA Kaufhold, J Fromm, T Riebe, M Mirbabaie, P Kuehn, AS Basyurt, ... Gesellschaft für Informatik eV, 2021 | 9 | 2021 |
Threatcrawl: A bert-based focused crawler for the cybersecurity domain P Kuehn, M Schmidt, M Bayer, C Reuter arXiv preprint arXiv:2304.11960, 2023 | 4 | 2023 |
The Notion of Relevance in Cybersecurity: A Categorization of Security Tools and Deduction of Relevance Notions P Kuehn, J Bäumler, MA Kaufhold, M Wendelborn, C Reuter Gesellschaft für Informatik eV, 2022 | 3 | 2022 |
Navigating the shadows: Manual and semi-automated evaluation of the dark web for cyber threat intelligence P Kühn, K Wittorf, C Reuter IEEE Access, 2024 | 2 | 2024 |
ExTRUST: Reducing Exploit Stockpiles With a Privacy-Preserving Depletion System for Inter-State Relationships T Reinhold, P Kuehn, D Günther, T Schneider, C Reuter IEEE Transactions on Technology and Society 4 (2), 158-170, 2023 | 2 | 2023 |
Clustering of threat information to mitigate information overload for computer emergency response teams P Kuehn, M Kerk, M Wendelborn, C Reuter arXiv preprint arXiv:2210.14067, 2022 | 2 | 2022 |
Towards resilient critical infrastructures–motivating users to contribute to smart grid resilience R Egert, N Gerber, J Haunschild, P Kuehn, V Zimmermann i-com 20 (2), 161-175, 2021 | 2 | 2021 |
Common Vulnerability Scoring System Prediction Based on Open Source Intelligence Information Sources [Data Set & Models] P Kuehn, D Relke, C Reuter | | 2023 |