The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Fredrik Valeur: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur
    Bayesian Event Classification for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:14-23 [Conf]
  2. Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richard A. Kemmerer
    Composable Tools For Network Discovery and Security Analysis. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:14-24 [Conf]
  3. Fredrik Valeur, Darren Mutz, Giovanni Vigna
    A Learning-Based Approach to the Detection of SQL Attacks. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2005, pp:123-140 [Conf]
  4. Christopher Krügel, Darren Mutz, Fredrik Valeur, Giovanni Vigna
    On the Detection of Anomalous System Call Arguments. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2003, pp:326-343 [Conf]
  5. William K. Robertson, Christopher Krügel, Darren Mutz, Fredrik Valeur
    Run-time Detection of Heap-based Overflows. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:51-60 [Conf]
  6. André Årnes, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer
    Using Hidden Markov Models to Evaluate the Risks of Intrusions. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:145-164 [Conf]
  7. Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur
    Topology-Based Detection of Anomalous BGP Messages. [Citation Graph (0, 0)][DBLP]
    RAID, 2003, pp:17-35 [Conf]
  8. Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Engin Kirda
    An anomaly-driven reverse proxy for web applications. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:361-368 [Conf]
  9. Giovanni Vigna, Fredrik Valeur, Richard A. Kemmerer
    Designing and implementing a family of intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:88-97 [Conf]
  10. Christopher Krügel, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer
    Stateful Intrusion Detection for High-Speed Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:285-0 [Conf]
  11. Christopher Krügel, William K. Robertson, Fredrik Valeur, Giovanni Vigna
    Static Disassembly of Obfuscated Binaries. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:255-270 [Conf]
  12. Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer
    A Comprehensive Approach to Intrusion Detection Alert Correlation. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2004, v:1, n:3, pp:146-169 [Journal]
  13. Darren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Krügel
    Anomalous system call detection. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2006, v:9, n:1, pp:61-93 [Journal]

  14. Are your votes really counted?: testing the security of real-world electronic voting systems. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002