The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Christian Kreibich: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Holger Dreger, Christian Kreibich, Vern Paxson, Robin Sommer
    Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2005, pp:206-221 [Conf]
  2. Christian Kreibich, Robin Sommer
    Policy-Controlled Event Management for Distributed Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:385-391 [Conf]
  3. Christian Kreibich, Jon Crowcroft
    Efficient sequence alignment of network traffic. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Conference, 2006, pp:307-312 [Conf]
  4. Justin Ma, Kirill Levchenko, Christian Kreibich, Stefan Savage, Geoffrey M. Voelker
    Unexpected means of protocol inference. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Conference, 2006, pp:313-326 [Conf]
  5. Christian Kreibich
    Design and Implementation of Netdude, a Framework for Packet Trace Manipulation (Awarded Best Student Paper!). [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, FREENIX Track, 2004, pp:63-72 [Conf]
  6. Christian Kreibich
    Brooery: A Graphical Environment for Analysis of Security-Relevant Network Activity. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, FREENIX Track, 2005, pp:109-118 [Conf]
  7. Christian Kreibich, Jon Crowcroft
    Honeycomb: creating intrusion detection signatures using honeypots. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:1, pp:51-56 [Journal]
  8. Jon Crowcroft, Christian Kreibich
    Only 365 days left until the Sigcomm deadline. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2006, v:36, n:5, pp:57-62 [Journal]

  9. Spamalytics: an empirical analysis of spam marketing conversion. [Citation Graph (, )][DBLP]


  10. Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering. [Citation Graph (, )][DBLP]


  11. A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. [Citation Graph (, )][DBLP]


  12. On the Spam Campaign Trail. [Citation Graph (, )][DBLP]


  13. Principles for Developing Comprehensive Network Visibility. [Citation Graph (, )][DBLP]


  14. Spamalytics: an empirical analysis of spam marketing conversion. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002