Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On High-Speed Flow-Based Intrusion Detection Using Snort-Compatible Signatures., and . IEEE Trans. Dependable Secur. Comput., 19 (1): 495-506 (2022)Work Balancing vs. Load Balancing for Network IDS Parallelization., , , and . IWCMC, page 488-493. IEEE, (2023)Improving Network Monitoring through Aggregation of HTTP/1.1 Dialogs in IPFIX., , and . LCN, page 543-546. IEEE Computer Society, (2016)High Performance Intrusion Detection Using HTTP-Based Payload Aggregation., and . LCN, page 418-425. IEEE Computer Society, (2017)Testing IDS using GENESIDS: Realistic Mixed Traffic Generation for IDS Evaluation., and . SIGCOMM Posters and Demos, page 153-155. ACM, (2018)FIXIDS: A high-speed signature-based flow intrusion detection system., and . NOMS, page 1-8. IEEE, (2018)Cleaning up Web 2.0's Security Mess-at Least Partly., , , , , , , and . IEEE Secur. Priv., 14 (2): 48-57 (2016)How to Test an IDS?: GENESIDS: An Automated System for Generating Attack Traffic., and . WTMC@SIGCOMM, page 46-51. ACM, (2018)Efficient intrusion detection in high-speed networks.. University of Paderborn, Germany, (2019)Reliable communication using Erasure Codes for monitoring bats in the wild., , , , , and . INFOCOM Workshops, page 189-190. IEEE, (2014)