The SCEAS System
Navigation Menu

Search the dblp DataBase


Konrad Rieck: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Konrad Rieck, Pavel Laskov, Klaus-Robert Müller
    Efficient Algorithms for Similarity Measures over Sequential Data: A Look Beyond Kernels. [Citation Graph (0, 0)][DBLP]
    DAGM-Symposium, 2006, pp:374-383 [Conf]
  2. Konrad Rieck, Pavel Laskov
    Detecting Unknown Network Attacks Using Language Models. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2006, pp:74-90 [Conf]
  3. Pavel Laskov, Patrick Düssel, Christin Schäfer, Konrad Rieck
    Learning Intrusion Detection: Supervised or Unsupervised?. [Citation Graph (0, 0)][DBLP]
    ICIAP, 2005, pp:50-57 [Conf]
  4. Pavel Laskov, Konrad Rieck, Christin Schäfer, Klaus-Robert Müller
    Visualization of anomaly detection using prediction sensitivity. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2005, pp:197-208 [Conf]
  5. Konrad Rieck, Pavel Laskov, Sören Sonnenburg
    Computation of Similarity Measures for Sequential Data using Generalized Suffix Trees. [Citation Graph (0, 0)][DBLP]
    NIPS, 2006, pp:1177-1184 [Conf]
  6. Konrad Rieck, Pavel Laskov
    Language models for detection of unknown attacks in network traffic. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:2, n:4, pp:243-256 [Journal]

  7. Active learning for network intrusion detection. [Citation Graph (, )][DBLP]

  8. 08102 Working Group -- Requirements for Network Monitoring from an IDS Perspective. [Citation Graph (, )][DBLP]

  9. 8102 Working Group -- Attack Taxonomy. [Citation Graph (, )][DBLP]

  10. Learning and Classification of Malware Behavior. [Citation Graph (, )][DBLP]

  11. Incorporation of Application Layer Protocol Syntax into Anomaly Detection. [Citation Graph (, )][DBLP]

  12. Measuring and Detecting Fast-Flux Service Networks. [Citation Graph (, )][DBLP]

  13. Botzilla: detecting the "phoning home" of malicious software. [Citation Graph (, )][DBLP]

  14. TokDoc: a self-healing web application firewall. [Citation Graph (, )][DBLP]

  15. A Self-learning System for Detection of Anomalous SIP Messages. [Citation Graph (, )][DBLP]

  16. Securing IMS against novel threats. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002