Author of the publication

An analysis of signature overlaps in Intrusion Detection Systems.

, and . DSN, page 109-120. IEEE Compute Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Context-Based Intrusion Detection Using Snort, Nessus and Bugtraq Databases., , and . PST, (2005)Model-Driven, Network-Context Sensitive Intrusion Detection., , , and . MoDELS, volume 4735 of Lecture Notes in Computer Science, page 61-75. Springer, (2007)Packet Space Analysis of Intrusion Detection Signatures.. RAID, volume 5758 of Lecture Notes in Computer Science, page 365-366. Springer, (2009)Blueprints of a lightweight automated experimentation system: a building block towards experimental cyber security., and . BADGERS@EuroSys, page 19-28. ACM, (2011)Navigating and visualizing the malware intelligence space., , , and . IEEE Netw., 26 (6): 19-25 (2012)Using Contextual Information for IDS Alarm Classification (Extended Abstract)., , and . DIMVA, volume 5587 of Lecture Notes in Computer Science, page 147-156. Springer, (2009)Revisiting Static Analysis of Android Malware., and . CSET @ USENIX Security Symposium, USENIX Association, (2017)Automatic Evaluation of Intrusion Detection Systems., , , , and . ACSAC, page 361-370. IEEE Computer Society, (2006)Toward Automatic Generation of Intrusion Detection Verification Rules., , and . ACSAC, page 279-288. IEEE Computer Society, (2008)An analysis of signature overlaps in Intrusion Detection Systems., and . DSN, page 109-120. IEEE Compute Society, (2011)