Search the dblp DataBase
Robin Sommer :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Robin Sommer , Vern Paxson Exploiting Independent State For Network Intrusion Detection. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:59-71 [Conf ] Holger Dreger , Anja Feldmann , Vern Paxson , Robin Sommer Operational experiences with high-volume network intrusion detection. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2004, pp:2-11 [Conf ] Robin Sommer , Vern Paxson Enhancing byte-level network intrusion detection signatures with context. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:262-271 [Conf ] Robin Sommer Bro: An Open Source Network Intrusion Detection System. [Citation Graph (0, 0)][DBLP ] DFN-Arbeitstagung über Kommunikationsnetze, 2003, pp:273-288 [Conf ] Holger Dreger , Christian Kreibich , Vern Paxson , Robin Sommer Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context. [Citation Graph (0, 0)][DBLP ] DIMVA, 2005, pp:206-221 [Conf ] Christian Kreibich , Robin Sommer Policy-Controlled Event Management for Distributed Intrusion Detection. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2005, pp:385-391 [Conf ] Ruoming Pang , Vern Paxson , Robin Sommer , Larry L. Peterson binpac: a yacc for writing application protocol parsers. [Citation Graph (0, 0)][DBLP ] Internet Measurement Conference, 2006, pp:289-300 [Conf ] Andy Rupp , Holger Dreger , Anja Feldmann , Robin Sommer Packet trace manipulation rramework for test labs. [Citation Graph (0, 0)][DBLP ] Internet Measurement Conference, 2004, pp:251-256 [Conf ] Robin Sommer , Anja Feldmann NetFlow: information loss or win? [Citation Graph (0, 0)][DBLP ] Internet Measurement Workshop, 2002, pp:173-174 [Conf ] Stefan Kornexl , Vern Paxson , Holger Dreger , Anja Feldmann , Robin Sommer Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic. [Citation Graph (0, 0)][DBLP ] Internet Measurment Conference, 2005, pp:267-272 [Conf ] Matthias Vallentin , Robin Sommer , Jason Lee , Craig Leres , Vern Paxson , Brian Tierney The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. [Citation Graph (0, 0)][DBLP ] RAID, 2007, pp:107-126 [Conf ] Detecting Forged TCP Reset Packets. [Citation Graph (, )][DBLP ] Predicting the Resource Consumption of Network Intrusion Detection Systems. [Citation Graph (, )][DBLP ] Enriching network security analysis with time travel. [Citation Graph (, )][DBLP ] Predicting the resource consumption of network intrusion detection systems. [Citation Graph (, )][DBLP ] Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. [Citation Graph (, )][DBLP ] Principles for Developing Comprehensive Network Visibility. [Citation Graph (, )][DBLP ] An architecture for exploiting multi-core processors to parallelize network intrusion prevention. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.003secs