Search the dblp DataBase
Christian Kreibich :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Holger Dreger , Christian Kreibich , Vern Paxson , Robin Sommer Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context. [Citation Graph (0, 0)][DBLP ] DIMVA, 2005, pp:206-221 [Conf ] Christian Kreibich , Robin Sommer Policy-Controlled Event Management for Distributed Intrusion Detection. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2005, pp:385-391 [Conf ] Christian Kreibich , Jon Crowcroft Efficient sequence alignment of network traffic. [Citation Graph (0, 0)][DBLP ] Internet Measurement Conference, 2006, pp:307-312 [Conf ] Justin Ma , Kirill Levchenko , Christian Kreibich , Stefan Savage , Geoffrey M. Voelker Unexpected means of protocol inference. [Citation Graph (0, 0)][DBLP ] Internet Measurement Conference, 2006, pp:313-326 [Conf ] Christian Kreibich Design and Implementation of Netdude, a Framework for Packet Trace Manipulation (Awarded Best Student Paper!). [Citation Graph (0, 0)][DBLP ] USENIX Annual Technical Conference, FREENIX Track, 2004, pp:63-72 [Conf ] Christian Kreibich Brooery: A Graphical Environment for Analysis of Security-Relevant Network Activity. [Citation Graph (0, 0)][DBLP ] USENIX Annual Technical Conference, FREENIX Track, 2005, pp:109-118 [Conf ] Christian Kreibich , Jon Crowcroft Honeycomb: creating intrusion detection signatures using honeypots. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2004, v:34, n:1, pp:51-56 [Journal ] Jon Crowcroft , Christian Kreibich Only 365 days left until the Sigcomm deadline. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2006, v:36, n:5, pp:57-62 [Journal ] Spamalytics: an empirical analysis of spam marketing conversion. [Citation Graph (, )][DBLP ] Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering. [Citation Graph (, )][DBLP ] A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. [Citation Graph (, )][DBLP ] On the Spam Campaign Trail. [Citation Graph (, )][DBLP ] Principles for Developing Comprehensive Network Visibility. [Citation Graph (, )][DBLP ] Spamalytics: an empirical analysis of spam marketing conversion. [Citation Graph (, )][DBLP ] Search in 0.013secs, Finished in 0.014secs