The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Robin Sommer: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Robin Sommer, Vern Paxson
    Exploiting Independent State For Network Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:59-71 [Conf]
  2. Holger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer
    Operational experiences with high-volume network intrusion detection. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:2-11 [Conf]
  3. Robin Sommer, Vern Paxson
    Enhancing byte-level network intrusion detection signatures with context. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:262-271 [Conf]
  4. Robin Sommer
    Bro: An Open Source Network Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    DFN-Arbeitstagung über Kommunikationsnetze, 2003, pp:273-288 [Conf]
  5. Holger Dreger, Christian Kreibich, Vern Paxson, Robin Sommer
    Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2005, pp:206-221 [Conf]
  6. Christian Kreibich, Robin Sommer
    Policy-Controlled Event Management for Distributed Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:385-391 [Conf]
  7. Ruoming Pang, Vern Paxson, Robin Sommer, Larry L. Peterson
    binpac: a yacc for writing application protocol parsers. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Conference, 2006, pp:289-300 [Conf]
  8. Andy Rupp, Holger Dreger, Anja Feldmann, Robin Sommer
    Packet trace manipulation rramework for test labs. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Conference, 2004, pp:251-256 [Conf]
  9. Robin Sommer, Anja Feldmann
    NetFlow: information loss or win? [Citation Graph (0, 0)][DBLP]
    Internet Measurement Workshop, 2002, pp:173-174 [Conf]
  10. Stefan Kornexl, Vern Paxson, Holger Dreger, Anja Feldmann, Robin Sommer
    Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic. [Citation Graph (0, 0)][DBLP]
    Internet Measurment Conference, 2005, pp:267-272 [Conf]
  11. Matthias Vallentin, Robin Sommer, Jason Lee, Craig Leres, Vern Paxson, Brian Tierney
    The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:107-126 [Conf]

  12. Detecting Forged TCP Reset Packets. [Citation Graph (, )][DBLP]


  13. Predicting the Resource Consumption of Network Intrusion Detection Systems. [Citation Graph (, )][DBLP]


  14. Enriching network security analysis with time travel. [Citation Graph (, )][DBLP]


  15. Predicting the resource consumption of network intrusion detection systems. [Citation Graph (, )][DBLP]


  16. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. [Citation Graph (, )][DBLP]


  17. Principles for Developing Comprehensive Network Visibility. [Citation Graph (, )][DBLP]


  18. An architecture for exploiting multi-core processors to parallelize network intrusion prevention. [Citation Graph (, )][DBLP]


Search in 0.022secs, Finished in 0.023secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002