|
Search the dblp DataBase
Jacob Zimmermann:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Stig Andersson, Andrew Clark, George M. Mohay, Bradley Schatz, Jacob Zimmermann
A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX. [Citation Graph (0, 0)][DBLP] ACSAC, 2005, pp:49-58 [Conf]
- Jacob Zimmermann, Ludovic Mé, Christophe Bidan
Experimenting with a Policy-Based HIDS Based on an Information Flow Control Model. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:364-373 [Conf]
- Jacob Zimmermann, George M. Mohay
Distributed intrusion detection in clusters based on non-interference. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2006, pp:89-95 [Conf]
- Jacob Zimmermann, Ludovic Mé, Christophe Bidan
An Improved Reference Flow Control Model for Policy-Based Intrusion Detection. [Citation Graph (0, 0)][DBLP] ESORICS, 2003, pp:291-308 [Conf]
- Jacob Zimmermann, Ludovic Mé, Christophe Bidan
Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Level. [Citation Graph (0, 0)][DBLP] RAID, 2002, pp:292-306 [Conf]
- Jacob Zimmermann, Andrew Clark, George M. Mohay, Fabien Pouget, Marc Dacier
The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet Traffic. [Citation Graph (0, 0)][DBLP] SADFE, 2005, pp:89-104 [Conf]
Towards Intrusion Detection for Encrypted Networks. [Citation Graph (, )][DBLP]
Search in 0.014secs, Finished in 0.015secs
|