Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Packet Space Analysis of Intrusion Detection Signatures.. RAID, volume 5758 of Lecture Notes in Computer Science, page 365-366. Springer, (2009)Model-Driven, Network-Context Sensitive Intrusion Detection., , , and . MoDELS, volume 4735 of Lecture Notes in Computer Science, page 61-75. Springer, (2007)Blueprints of a lightweight automated experimentation system: a building block towards experimental cyber security., and . BADGERS@EuroSys, page 19-28. ACM, (2011)Context-Based Intrusion Detection Using Snort, Nessus and Bugtraq Databases., , and . PST, (2005)Using Contextual Information for IDS Alarm Classification (Extended Abstract)., , and . DIMVA, volume 5587 of Lecture Notes in Computer Science, page 147-156. Springer, (2009)Navigating and visualizing the malware intelligence space., , , and . IEEE Netw., 26 (6): 19-25 (2012)Revisiting Static Analysis of Android Malware., and . CSET @ USENIX Security Symposium, USENIX Association, (2017)An analysis of signature overlaps in Intrusion Detection Systems., and . DSN, page 109-120. IEEE Compute Society, (2011)Automatic Evaluation of Intrusion Detection Systems., , , , and . ACSAC, page 361-370. IEEE Computer Society, (2006)Toward Automatic Generation of Intrusion Detection Verification Rules., , and . ACSAC, page 279-288. IEEE Computer Society, (2008)