Author of the publication

Stateful Intrusion Detection for High-Speed Networks.

, , , and . IEEE Symposium on Security and Privacy, page 285-293. IEEE Computer Society, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Valeur, Fredrik
add a person with the name Valeur, Fredrik
 

Other publications of authors with the same name

Stateful Intrusion Detection for High-Speed Networks., , , and . IEEE Symposium on Security and Privacy, page 285-293. IEEE Computer Society, (2002)An Experience in Testing the Security of Real-World Electronic Voting Systems., , , , , , , and . IEEE Trans. Software Eng., 36 (4): 453-473 (2010)Bayesian Event Classification for Intrusion Detection., , , and . ACSAC, page 14-23. IEEE Computer Society, (2003)Static Disassembly of Obfuscated Binaries., , , and . USENIX Security Symposium, page 255-270. USENIX, (2004)Are your votes really counted?: testing the security of real-world electronic voting systems., , , , , , , and . ISSTA, page 237-248. ACM, (2008)Designing and implementing a family of intrusion detection systems., , and . ESEC / SIGSOFT FSE, page 88-97. ACM, (2003)Composable Tools For Network Discovery and Security Analysis., , , and . ACSAC, page 14-24. IEEE Computer Society, (2002)Anomalous system call detection., , , and . ACM Trans. Inf. Syst. Secur., 9 (1): 61-93 (2006)On the Detection of Anomalous System Call Arguments., , , and . ESORICS, volume 2808 of Lecture Notes in Computer Science, page 326-343. Springer, (2003)Topology-Based Detection of Anomalous BGP Messages., , , and . RAID, volume 2820 of Lecture Notes in Computer Science, page 17-35. Springer, (2003)