Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bayesian Event Classification for Intrusion Detection., , , and . ACSAC, page 14-23. IEEE Computer Society, (2003)Stateful Intrusion Detection for High-Speed Networks., , , and . S&P, page 285-293. IEEE Computer Society, (2002)Are your votes really counted?: testing the security of real-world electronic voting systems., , , , , , , and . ISSTA, page 237-248. ACM, (2008)Static Disassembly of Obfuscated Binaries., , , and . USENIX Security Symposium, page 255-270. USENIX, (2004)Designing and implementing a family of intrusion detection systems., , and . ESEC / SIGSOFT FSE, page 88-97. ACM, (2003)On the Detection of Anomalous System Call Arguments., , , and . ESORICS, volume 2808 of Lecture Notes in Computer Science, page 326-343. Springer, (2003)Composable Tools For Network Discovery and Security Analysis., , , and . ACSAC, page 14-24. IEEE Computer Society, (2002)Using Hidden Markov Models to Evaluate the Risks of Intrusions., , , and . RAID, volume 4219 of Lecture Notes in Computer Science, page 145-164. Springer, (2006)A Learning-Based Approach to the Detection of SQL Attacks., , and . DIMVA, volume 3548 of Lecture Notes in Computer Science, page 123-140. Springer, (2005)An anomaly-driven reverse proxy for web applications., , , and . SAC, page 361-368. ACM, (2006)