|
Search the dblp DataBase
Konrad Rieck:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Konrad Rieck, Pavel Laskov, Klaus-Robert Müller
Efficient Algorithms for Similarity Measures over Sequential Data: A Look Beyond Kernels. [Citation Graph (0, 0)][DBLP] DAGM-Symposium, 2006, pp:374-383 [Conf]
- Konrad Rieck, Pavel Laskov
Detecting Unknown Network Attacks Using Language Models. [Citation Graph (0, 0)][DBLP] DIMVA, 2006, pp:74-90 [Conf]
- Pavel Laskov, Patrick Düssel, Christin Schäfer, Konrad Rieck
Learning Intrusion Detection: Supervised or Unsupervised?. [Citation Graph (0, 0)][DBLP] ICIAP, 2005, pp:50-57 [Conf]
- Pavel Laskov, Konrad Rieck, Christin Schäfer, Klaus-Robert Müller
Visualization of anomaly detection using prediction sensitivity. [Citation Graph (0, 0)][DBLP] Sicherheit, 2005, pp:197-208 [Conf]
- Konrad Rieck, Pavel Laskov, Sören Sonnenburg
Computation of Similarity Measures for Sequential Data using Generalized Suffix Trees. [Citation Graph (0, 0)][DBLP] NIPS, 2006, pp:1177-1184 [Conf]
- Konrad Rieck, Pavel Laskov
Language models for detection of unknown attacks in network traffic. [Citation Graph (0, 0)][DBLP] Journal in Computer Virology, 2007, v:2, n:4, pp:243-256 [Journal]
Active learning for network intrusion detection. [Citation Graph (, )][DBLP]
08102 Working Group -- Requirements for Network Monitoring from an IDS Perspective. [Citation Graph (, )][DBLP]
8102 Working Group -- Attack Taxonomy. [Citation Graph (, )][DBLP]
Learning and Classification of Malware Behavior. [Citation Graph (, )][DBLP]
Incorporation of Application Layer Protocol Syntax into Anomaly Detection. [Citation Graph (, )][DBLP]
Measuring and Detecting Fast-Flux Service Networks. [Citation Graph (, )][DBLP]
Botzilla: detecting the "phoning home" of malicious software. [Citation Graph (, )][DBLP]
TokDoc: a self-healing web application firewall. [Citation Graph (, )][DBLP]
A Self-learning System for Detection of Anomalous SIP Messages. [Citation Graph (, )][DBLP]
Securing IMS against novel threats. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|