Author of the publication

Using model checking to identify errors in intrusion detection signatures.

, , and . STTT, 13 (1): 89-106 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using model checking to identify errors in intrusion detection signatures., , and . STTT, 13 (1): 89-106 (2011)Explorative Visualization of Log Data to Support Forensic Analysis and Signature Development., , , and . SADFE, page 109-118. IEEE Computer Society, (2010)Simplifying Signature Engineering by Reuse., , , and . ETRICS, volume 3995 of Lecture Notes in Computer Science, page 436-450. Springer, (2006)08102 Working Group -- Early Warning Systems., , , , , and . Network Attack Detection and Defense, volume 08102 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2008)Iterative präzisionsbewertende Signaturgenerierung., , , and . Sicherheit, volume P-170 of LNI, page 141-152. GI, (2010)Analyseverlagerung in IDS-Overlaynetzen., , and . Praxis der Informationsverarbeitung und Kommunikation, 32 (3): 188-200 (2009)Ansätze zur systematischen Ableitung von Signaturen: Methoden im Entwicklungsprozess einer Signatur.. Brandenburg University of Technology, (2011)Efficient Distributed Signature Analysis., , and . AIMS, volume 6734 of Lecture Notes in Computer Science, page 13-25. Springer, (2011)Improving the Efficiency of Misuse Detection., , and . DIMVA, volume 3548 of Lecture Notes in Computer Science, page 188-205. Springer, (2005)Systematische Ableitung von Signaturen durch Wiederverwendung am Beispiel von Snort., , and . Sicherheit, volume P-128 of LNI, page 367-379. GI, (2008)