|
Search the dblp DataBase
Christopher Krügel:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur
Bayesian Event Classification for Intrusion Detection. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:14-23 [Conf]
- Christopher Krügel, William K. Robertson, Giovanni Vigna
Detecting Kernel-Level Rootkits Through Binary Analysis. [Citation Graph (0, 0)][DBLP] ACSAC, 2004, pp:91-100 [Conf]
- Thomas Toth, Christopher Krügel
Evaluating the Impact of Automated Intrusion Response Mechanisms. [Citation Graph (0, 0)][DBLP] ACSAC, 2002, pp:301-310 [Conf]
- Christopher Krügel, Giovanni Vigna
Anomaly detection of web-based attacks. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2003, pp:251-261 [Conf]
- Engin Kirda, Christopher Krügel
Protecting Users Against Phishing Attacks with AntiPhish. [Citation Graph (0, 0)][DBLP] COMPSAC (1), 2005, pp:517-524 [Conf]
- Christopher Krügel, William K. Robertson
Alert Verification Determining the Success of Intrusion Attempts. [Citation Graph (0, 0)][DBLP] DIMVA, 2004, pp:25-38 [Conf]
- Manuel Egele, Martin Szydlowski, Engin Kirda, Christopher Krügel
Using Static Program Analysis to Aid Intrusion Detection. [Citation Graph (0, 0)][DBLP] DIMVA, 2006, pp:17-36 [Conf]
- Christopher Krügel, Darren Mutz, Fredrik Valeur, Giovanni Vigna
On the Detection of Anomalous System Call Arguments. [Citation Graph (0, 0)][DBLP] ESORICS, 2003, pp:326-343 [Conf]
- Engin Kirda, Clemens Kerer, Christopher Krügel, Roman Kurmanowytsch
Web Service Engineering with DIWE. [Citation Graph (0, 0)][DBLP] EUROMICRO, 2003, pp:283-290 [Conf]
- Christopher Krügel, Thomas Toth, Clemens Kerer
Decentralized Event Correlation for Intrusion Detection. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:114-131 [Conf]
- Pascal Fenkam, Harald Gall, Mehdi Jazayeri, Christopher Krügel
DPS : An Architectural Style for Development of Secure Software. [Citation Graph (0, 0)][DBLP] InfraSec, 2002, pp:180-198 [Conf]
- Patrick Klinkoff, Christopher Krügel, Engin Kirda, Giovanni Vigna
Extending .NET Security to Unmanaged Code. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:1-16 [Conf]
- Wolfgang Kastner, Christopher Krügel, Heinrich Reiter
Jini-ein guter Geist für die Gebäudesystemtechnik. [Citation Graph (0, 0)][DBLP] Java-Informations-Tage, 1999, pp:213-222 [Conf]
- William K. Robertson, Christopher Krügel, Darren Mutz, Fredrik Valeur
Run-time Detection of Heap-based Overflows. [Citation Graph (0, 0)][DBLP] LISA, 2003, pp:51-60 [Conf]
- Christopher Krügel, Thomas Toth
Distributed Pattern Detection for Intrusion Detection. [Citation Graph (0, 0)][DBLP] NDSS, 2002, pp:- [Conf]
- William K. Robertson, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. [Citation Graph (0, 0)][DBLP] NDSS, 2006, pp:- [Conf]
- Christopher Krügel, Thomas Toth, Engin Kirda
SPARTA, a Mobile Agent Based Instrusion Detection System. [Citation Graph (0, 0)][DBLP] Network Security, 2001, pp:187-200 [Conf]
- Clemens Kerer, Engin Kirda, Christopher Krügel
XGuide - A Practical Guide to XML-Based Web Engineering. [Citation Graph (0, 0)][DBLP] NETWORKING Workshops, 2002, pp:104-117 [Conf]
- Thomas Toth, Christopher Krügel
Accurate Buffer Overflow Detection via Abstract Payload Execution. [Citation Graph (0, 0)][DBLP] RAID, 2002, pp:274-291 [Conf]
- Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur
Topology-Based Detection of Anomalous BGP Messages. [Citation Graph (0, 0)][DBLP] RAID, 2003, pp:17-35 [Conf]
- Christopher Krügel, Thomas Toth
Using Decision Trees to Improve Signature-Based Intrusion Detection. [Citation Graph (0, 0)][DBLP] RAID, 2003, pp:173-191 [Conf]
- Christopher Krügel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna
Polymorphic Worm Detection Using Structural Information of Executables. [Citation Graph (0, 0)][DBLP] RAID, 2005, pp:207-226 [Conf]
- Engin Kirda, Christopher Krügel, Giovanni Vigna, Nenad Jovanovic
Noxes: a client-side solution for mitigating cross-site scripting attacks. [Citation Graph (0, 0)][DBLP] SAC, 2006, pp:330-337 [Conf]
- Christopher Krügel, Thomas Toth, Engin Kirda
Service specific anomaly detection for network intrusion detection. [Citation Graph (0, 0)][DBLP] SAC, 2002, pp:201-208 [Conf]
- Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Engin Kirda
An anomaly-driven reverse proxy for web applications. [Citation Graph (0, 0)][DBLP] SAC, 2006, pp:361-368 [Conf]
- Nenad Jovanovic, Christopher Krügel, Engin Kirda
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper). [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:258-263 [Conf]
- Christopher Krügel, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer
Stateful Intrusion Detection for High-Speed Networks. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2002, pp:285-0 [Conf]
- Andreas Moser, Christopher Krügel, Engin Kirda
Exploring Multiple Execution Paths for Malware Analysis. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2007, pp:231-245 [Conf]
- Christopher Krügel, William K. Robertson, Fredrik Valeur, Giovanni Vigna
Static Disassembly of Obfuscated Binaries. [Citation Graph (0, 0)][DBLP] USENIX Security Symposium, 2004, pp:255-270 [Conf]
- Engin Kirda, Clemens Kerer, Mehdi Jazayeri, Christopher Krügel
Supporting Multi-Device Enabled Web Services: Challenges and Open Problems. [Citation Graph (0, 0)][DBLP] WETICE, 2001, pp:49-54 [Conf]
- Stefan Kals, Engin Kirda, Christopher Krügel, Nenad Jovanovic
SecuBat: a web vulnerability scanner. [Citation Graph (0, 0)][DBLP] WWW, 2006, pp:247-256 [Conf]
- Engin Kirda, Christopher Krügel
Protecting Users against Phishing Attacks. [Citation Graph (0, 0)][DBLP] Comput. J., 2006, v:49, n:5, pp:554-561 [Journal]
- Christopher Krügel, Giovanni Vigna, William K. Robertson
A multi-model approach to the detection of web-based attacks. [Citation Graph (0, 0)][DBLP] Computer Networks, 2005, v:48, n:5, pp:717-738 [Journal]
- Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer
A Comprehensive Approach to Intrusion Detection Alert Correlation. [Citation Graph (0, 0)][DBLP] IEEE Trans. Dependable Sec. Comput., 2004, v:1, n:3, pp:146-169 [Journal]
- Darren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Krügel
Anomalous system call detection. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2006, v:9, n:1, pp:61-93 [Journal]
- Ulrich Bayer, Andreas Moser, Christopher Krügel, Engin Kirda
Dynamic Analysis of Malicious Code. [Citation Graph (0, 0)][DBLP] Journal in Computer Virology, 2006, v:2, n:1, pp:67-77 [Journal]
- Thomas Raffetseder, Christopher Krügel, Engin Kirda
Detecting System Emulators. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:1-18 [Conf]
Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. [Citation Graph (, )][DBLP]
Automatic Network Protocol Analysis. [Citation Graph (, )][DBLP]
Scalable, Behavior-Based Malware Clustering. [Citation Graph (, )][DBLP]
Protecting a Moving Target: Addressing Web Application Concept Drift. [Citation Graph (, )][DBLP]
Prospex: Protocol Specification Extraction. [Citation Graph (, )][DBLP]
Detection and analysis of drive-by-download attacks and malicious JavaScript code. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.457secs
|