Author of the publication

Detection of Brute-Force Attacks in End-to-End Encrypted Network Traffic.

, , , and . ARES, page 56:1-56:9. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

This Network is Infected : HosTaGe - a Low-Interaction Honeypot for Mobile Devices, , , , , , and . Security and Privacy in Smartphones & Mobile Devices, page 43--48. (2013)BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets, , , , and . IEEE International Conference on Communications (ICC),, (2016)SDN/NFV-based DDoS Mitigation via Pushback., and . ICC, page 1-6. IEEE, (2020)Enhanced performance for the encrypted web through TLS resumption across hostnames., , , , and . ARES, page 16:1-16:10. ACM, (2020)Zeek-Osquery: Host-Network Correlation for Advanced Monitoring and Intrusion Detection., , and . SEC, volume 580 of IFIP Advances in Information and Communication Technology, page 248-262. Springer, (2020)Enhanced Performance and Privacy for TLS over TCP Fast Open., , , , and . Proc. Priv. Enhancing Technol., 2020 (2): 271-287 (2020)Enhanced Performance and Privacy for TLS over TCP Fast Open., , , , and . CoRR, (2019)Efficient Attack Correlation and Identification of Attack Scenarios based on Network-Motifs., , and . IPCCC, page 1-11. IEEE, (2019)Service-Based Resilience via Shared Protection in Mission-Critical Embedded Networks., , and . IEEE Trans. Netw. Serv. Manag., 18 (3): 2687-2701 (2021)Towards Flexible Security Testing of OT Devices., , , , , , , , and . CoRR, (2020)