Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coding for a Believable Specification to Implementation Mapping., and . IEEE Symposium on Security and Privacy, page 140-149. IEEE Computer Society, (1987)Toward Efficient Querying of Compressed Network Payloads., , , and . USENIX Annual Technical Conference, page 113-124. USENIX Association, (2012)Guest Editorial: Introduction to the Special Section.. IEEE Trans. Software Eng., 22 (1): 3-5 (1996)Software diversity: use of diversity as a defense mechanism.. NSPW, page 19-20. ACM, (2005)Chaffing at the Bit: Thoughts on a Note by Ronald Rivest.. Information Hiding, volume 1768 of Lecture Notes in Computer Science, page 395-404. Springer, (1999)Intrusion and intrusion detection. International Journal of Information Security, 1 (1): 14-35 (2001)Sets, Bags, and Rock and Roll: Analyzing Large Data Sets of Network Data.. ESORICS, volume 3193 of Lecture Notes in Computer Science, page 407-422. Springer, (2004)Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory.. ACM Trans. Inf. Syst. Secur., 3 (4): 262-294 (2000)Why is there no science in cyber science?: a panel discussion at NSPW 2010., , and . NSPW, page 1-6. ACM, (2010)Sybil attacks as a mitigation strategy against the Storm botnet., , , and . MALWARE, page 32-40. IEEE Computer Society, (2008)