Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simulating Internet Worms., , and . MASCOTS, page 268-274. IEEE Computer Society, (2004)Secure and Flexible Monitoring of Virtual Machines., and . ACSAC, page 385-397. IEEE Computer Society, (2007)Detecting Malware Domains at the Upper DNS Hierarchy., , , , and . USENIX Security Symposium, USENIX Association, (2011)Proactive Detection of Distributed Denial of Service Attacks using MIB Traffic Variables - A Feasibility Study., , , , , , and . Integrated Network Management, page 609-622. IEEE, (2001)Comparative Study between Analytical Models and Packet-Level Worm Simulations., , and . PADS, page 88-98. IEEE Computer Society, (2005)An Extensible Environment for Evaluating Secure MANET., , and . SecureComm, page 339-352. IEEE, (2005)An assessment of VoIP covert channel threats., and . SecureComm, page 371-380. IEEE, (2007)Data Mining Approaches for Intrusion Detection., and . USENIX Security Symposium, USENIX Association, (1998)From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware., , , , , , and . USENIX Security Symposium, page 491-506. USENIX Association, (2012)Type Casting Verification: Stopping an Emerging Attack Vector., , , and . USENIX Security Symposium, page 81-96. USENIX Association, (2015)