The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Christopher Krügel: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur
    Bayesian Event Classification for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:14-23 [Conf]
  2. Christopher Krügel, William K. Robertson, Giovanni Vigna
    Detecting Kernel-Level Rootkits Through Binary Analysis. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:91-100 [Conf]
  3. Thomas Toth, Christopher Krügel
    Evaluating the Impact of Automated Intrusion Response Mechanisms. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:301-310 [Conf]
  4. Christopher Krügel, Giovanni Vigna
    Anomaly detection of web-based attacks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:251-261 [Conf]
  5. Engin Kirda, Christopher Krügel
    Protecting Users Against Phishing Attacks with AntiPhish. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:517-524 [Conf]
  6. Christopher Krügel, William K. Robertson
    Alert Verification Determining the Success of Intrusion Attempts. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2004, pp:25-38 [Conf]
  7. Manuel Egele, Martin Szydlowski, Engin Kirda, Christopher Krügel
    Using Static Program Analysis to Aid Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2006, pp:17-36 [Conf]
  8. Christopher Krügel, Darren Mutz, Fredrik Valeur, Giovanni Vigna
    On the Detection of Anomalous System Call Arguments. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2003, pp:326-343 [Conf]
  9. Engin Kirda, Clemens Kerer, Christopher Krügel, Roman Kurmanowytsch
    Web Service Engineering with DIWE. [Citation Graph (0, 0)][DBLP]
    EUROMICRO, 2003, pp:283-290 [Conf]
  10. Christopher Krügel, Thomas Toth, Clemens Kerer
    Decentralized Event Correlation for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:114-131 [Conf]
  11. Pascal Fenkam, Harald Gall, Mehdi Jazayeri, Christopher Krügel
    DPS : An Architectural Style for Development of Secure Software. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:180-198 [Conf]
  12. Patrick Klinkoff, Christopher Krügel, Engin Kirda, Giovanni Vigna
    Extending .NET Security to Unmanaged Code. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:1-16 [Conf]
  13. Wolfgang Kastner, Christopher Krügel, Heinrich Reiter
    Jini-ein guter Geist für die Gebäudesystemtechnik. [Citation Graph (0, 0)][DBLP]
    Java-Informations-Tage, 1999, pp:213-222 [Conf]
  14. William K. Robertson, Christopher Krügel, Darren Mutz, Fredrik Valeur
    Run-time Detection of Heap-based Overflows. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:51-60 [Conf]
  15. Christopher Krügel, Thomas Toth
    Distributed Pattern Detection for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  16. William K. Robertson, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer
    Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  17. Christopher Krügel, Thomas Toth, Engin Kirda
    SPARTA, a Mobile Agent Based Instrusion Detection System. [Citation Graph (0, 0)][DBLP]
    Network Security, 2001, pp:187-200 [Conf]
  18. Clemens Kerer, Engin Kirda, Christopher Krügel
    XGuide - A Practical Guide to XML-Based Web Engineering. [Citation Graph (0, 0)][DBLP]
    NETWORKING Workshops, 2002, pp:104-117 [Conf]
  19. Thomas Toth, Christopher Krügel
    Accurate Buffer Overflow Detection via Abstract Payload Execution. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:274-291 [Conf]
  20. Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur
    Topology-Based Detection of Anomalous BGP Messages. [Citation Graph (0, 0)][DBLP]
    RAID, 2003, pp:17-35 [Conf]
  21. Christopher Krügel, Thomas Toth
    Using Decision Trees to Improve Signature-Based Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    RAID, 2003, pp:173-191 [Conf]
  22. Christopher Krügel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna
    Polymorphic Worm Detection Using Structural Information of Executables. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:207-226 [Conf]
  23. Engin Kirda, Christopher Krügel, Giovanni Vigna, Nenad Jovanovic
    Noxes: a client-side solution for mitigating cross-site scripting attacks. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:330-337 [Conf]
  24. Christopher Krügel, Thomas Toth, Engin Kirda
    Service specific anomaly detection for network intrusion detection. [Citation Graph (0, 0)][DBLP]
    SAC, 2002, pp:201-208 [Conf]
  25. Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Engin Kirda
    An anomaly-driven reverse proxy for web applications. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:361-368 [Conf]
  26. Nenad Jovanovic, Christopher Krügel, Engin Kirda
    Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper). [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:258-263 [Conf]
  27. Christopher Krügel, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer
    Stateful Intrusion Detection for High-Speed Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:285-0 [Conf]
  28. Andreas Moser, Christopher Krügel, Engin Kirda
    Exploring Multiple Execution Paths for Malware Analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:231-245 [Conf]
  29. Christopher Krügel, William K. Robertson, Fredrik Valeur, Giovanni Vigna
    Static Disassembly of Obfuscated Binaries. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:255-270 [Conf]
  30. Engin Kirda, Clemens Kerer, Mehdi Jazayeri, Christopher Krügel
    Supporting Multi-Device Enabled Web Services: Challenges and Open Problems. [Citation Graph (0, 0)][DBLP]
    WETICE, 2001, pp:49-54 [Conf]
  31. Stefan Kals, Engin Kirda, Christopher Krügel, Nenad Jovanovic
    SecuBat: a web vulnerability scanner. [Citation Graph (0, 0)][DBLP]
    WWW, 2006, pp:247-256 [Conf]
  32. Engin Kirda, Christopher Krügel
    Protecting Users against Phishing Attacks. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2006, v:49, n:5, pp:554-561 [Journal]
  33. Christopher Krügel, Giovanni Vigna, William K. Robertson
    A multi-model approach to the detection of web-based attacks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:48, n:5, pp:717-738 [Journal]
  34. Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer
    A Comprehensive Approach to Intrusion Detection Alert Correlation. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2004, v:1, n:3, pp:146-169 [Journal]
  35. Darren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Krügel
    Anomalous system call detection. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2006, v:9, n:1, pp:61-93 [Journal]
  36. Ulrich Bayer, Andreas Moser, Christopher Krügel, Engin Kirda
    Dynamic Analysis of Malicious Code. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2006, v:2, n:1, pp:67-77 [Journal]
  37. Thomas Raffetseder, Christopher Krügel, Engin Kirda
    Detecting System Emulators. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:1-18 [Conf]

  38. Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. [Citation Graph (, )][DBLP]


  39. Automatic Network Protocol Analysis. [Citation Graph (, )][DBLP]


  40. Scalable, Behavior-Based Malware Clustering. [Citation Graph (, )][DBLP]


  41. Protecting a Moving Target: Addressing Web Application Concept Drift. [Citation Graph (, )][DBLP]


  42. Prospex: Protocol Specification Extraction. [Citation Graph (, )][DBLP]


  43. Detection and analysis of drive-by-download attacks and malicious JavaScript code. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.457secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002