Conferences in DBLP
Tobias Chyssler , Stefan Burschka , Michael Semling , Tomas Lingvall , Kalle Burbeck Alarm Reduction and Correlation in Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] DIMVA, 2004, pp:9-24 [Conf ] Christopher Krügel , William K. Robertson Alert Verification Determining the Success of Intrusion Attempts. [Citation Graph (0, 0)][DBLP ] DIMVA, 2004, pp:25-38 [Conf ] Marko Jahnke , Martin Lies , Sven Henkel , Michael Bussmann , Jens Tölle Komponenten für kooperative Intrusion-Detection in dynamischen Koalitionsumgebungen. [Citation Graph (0, 0)][DBLP ] DIMVA, 2004, pp:39-53 [Conf ] Peter Herrmann , Lars Wiebusch , Heiko Krumm Vertrauensbasierte Laufzeitüberwachung verteilter komponentenstrukturierter E-Commerce-Software. [Citation Graph (0, 0)][DBLP ] DIMVA, 2004, pp:55-70 [Conf ] Pavel Laskov , Christin Schäfer , Igor V. Kotenko Intrusion detection in unlabeled data with quarter-sphere Support Vector Machines. [Citation Graph (0, 0)][DBLP ] DIMVA, 2004, pp:71-82 [Conf ] Frank Kargl , Andreas Klenk , Michael Weber , Stefan Schlott Sensors for Detection of Misbehaving Nodes in MANETs. [Citation Graph (0, 0)][DBLP ] DIMVA, 2004, pp:83-97 [Conf ] Joerg Abendroth Aktive Strategien zur Schutzzielverletzungserkennung durch eine kontrollierte Machtteilung in der Zugriffskontrollarchitektur. [Citation Graph (0, 0)][DBLP ] DIMVA, 2004, pp:99-112 [Conf ] Helmut Reiser , Gereon Volker A Honeynet within the German Research Network - Experiences and Results. [Citation Graph (0, 0)][DBLP ] DIMVA, 2004, pp:113-128 [Conf ] Maximillian Dornseif , Felix C. Gärtner , Thorsten Holz Ermittlung von Verwundbarkeiten mit elektronischen Ködern. [Citation Graph (0, 0)][DBLP ] DIMVA, 2004, pp:129-141 [Conf ] Shai Rubin , Ian D. Alderman , David W. Parter , Mary K. Vernon Foundations for Intrusion Prevention. [Citation Graph (0, 0)][DBLP ] DIMVA, 2004, pp:143-160 [Conf ] Halvar Flake Structural Comparison of Executable Objects. [Citation Graph (0, 0)][DBLP ] DIMVA, 2004, pp:161-173 [Conf ] Marc Schönefeld Anti-Patterns in JDK Security and Refactorings. [Citation Graph (0, 0)][DBLP ] DIMVA, 2004, pp:175-186 [Conf ] Teobaldo A. Dantas de Medeiros , Paulo S. Motta Pires LIV - The Linux Integrated Viruswall. [Citation Graph (0, 0)][DBLP ] DIMVA, 2004, pp:187-200 [Conf ] Heiko Fangmeier , Michel Messerschmidt , Fabian Müller , Jan Seedorf Risiken der Nichterkennung von Malware in komprimierter Form. [Citation Graph (0, 0)][DBLP ] DIMVA, 2004, pp:201-211 [Conf ]