Search the dblp DataBase
Engin Kirda :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Engin Kirda , Clemens Kerer DIWE: A Framework for Constructing Device-Independent Web Applications. [Citation Graph (0, 0)][DBLP ] UMICS, 2004, pp:96-110 [Conf ] Roman Kurmanowytsch , Engin Kirda , Clemens Kerer , Schahram Dustdar OMNIX: A Topology-Independent P2P Middleware. [Citation Graph (0, 0)][DBLP ] CAiSE Workshops, 2003, pp:- [Conf ] Clemens Kerer , Engin Kirda , Mehdi Jazayeri , Roman Kurmanowytsch Building and Managing XML/XSL-powered Web Sites: an Experience Report. [Citation Graph (0, 0)][DBLP ] COMPSAC, 2001, pp:547-554 [Conf ] Engin Kirda , Harald Gall , Pascal Fenkam , Gerald Reif MOTION: A Peer-to-Peer Platform for Mobile Teamwork Support. [Citation Graph (0, 0)][DBLP ] COMPSAC, 2002, pp:1115-1117 [Conf ] Engin Kirda , Christopher Krügel Protecting Users Against Phishing Attacks with AntiPhish. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:517-524 [Conf ] Manuel Egele , Martin Szydlowski , Engin Kirda , Christopher Krügel Using Static Program Analysis to Aid Intrusion Detection. [Citation Graph (0, 0)][DBLP ] DIMVA, 2006, pp:17-36 [Conf ] Engin Kirda , Clemens Kerer , Christopher Krügel , Roman Kurmanowytsch Web Service Engineering with DIWE. [Citation Graph (0, 0)][DBLP ] EUROMICRO, 2003, pp:283-290 [Conf ] Engin Kirda , Gerald Reif , Harald Gall , Pascal Fenkam TWSAPI: A Generic Teamwork Services Application Programming Interface. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2002, pp:365-372 [Conf ] Engin Kirda Web Engineering Device Independent Web Services. [Citation Graph (0, 0)][DBLP ] ICSE, 2001, pp:795-796 [Conf ] Clemens Kerer , Engin Kirda XGuide - Concurrent Web Engineering with Contracts. [Citation Graph (0, 0)][DBLP ] ICWE, 2004, pp:88-92 [Conf ] Patrick Klinkoff , Christopher Krügel , Engin Kirda , Giovanni Vigna Extending .NET Security to Unmanaged Code. [Citation Graph (0, 0)][DBLP ] ISC, 2006, pp:1-16 [Conf ] Christopher Krügel , Thomas Toth , Engin Kirda SPARTA, a Mobile Agent Based Instrusion Detection System. [Citation Graph (0, 0)][DBLP ] Network Security, 2001, pp:187-200 [Conf ] Clemens Kerer , Engin Kirda , Christopher Krügel XGuide - A Practical Guide to XML-Based Web Engineering. [Citation Graph (0, 0)][DBLP ] NETWORKING Workshops, 2002, pp:104-117 [Conf ] Roman Kurmanowytsch , Mehdi Jazayeri , Engin Kirda Towards a Hierarchical, Semantic Peer-to-Peer Topology. [Citation Graph (0, 0)][DBLP ] Peer-to-Peer Computing, 2002, pp:167-168 [Conf ] Christopher Krügel , Engin Kirda , Darren Mutz , William K. Robertson , Giovanni Vigna Polymorphic Worm Detection Using Structural Information of Executables. [Citation Graph (0, 0)][DBLP ] RAID, 2005, pp:207-226 [Conf ] Engin Kirda , Christopher Krügel , Giovanni Vigna , Nenad Jovanovic Noxes: a client-side solution for mitigating cross-site scripting attacks. [Citation Graph (0, 0)][DBLP ] SAC, 2006, pp:330-337 [Conf ] Christopher Krügel , Thomas Toth , Engin Kirda Service specific anomaly detection for network intrusion detection. [Citation Graph (0, 0)][DBLP ] SAC, 2002, pp:201-208 [Conf ] Fredrik Valeur , Giovanni Vigna , Christopher Krügel , Engin Kirda An anomaly-driven reverse proxy for web applications. [Citation Graph (0, 0)][DBLP ] SAC, 2006, pp:361-368 [Conf ] Sagar Chaki , Pascal Fenkam , Harald Gall , Somesh Jha , Engin Kirda , Helmut Veith Integrating Publish/Subscribe into a Mobile Teamwork Support Platform. [Citation Graph (0, 0)][DBLP ] SEKE, 2003, pp:510-517 [Conf ] Engin Kirda , Pascal Fenkam , Gerald Reif , Harald Gall A service architecture for mobile teamwork. [Citation Graph (0, 0)][DBLP ] SEKE, 2002, pp:513-518 [Conf ] Engin Kirda Engineering of Web services with XML and XSL. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2001, pp:318-319 [Conf ] Nenad Jovanovic , Christopher Krügel , Engin Kirda Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper). [Citation Graph (0, 0)][DBLP ] S&P, 2006, pp:258-263 [Conf ] Andreas Moser , Christopher Krügel , Engin Kirda Exploring Multiple Execution Paths for Malware Analysis. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:231-245 [Conf ] Clemens Kerer , Engin Kirda Layout, Content and Logic Separation in Web Engineering. [Citation Graph (0, 0)][DBLP ] Web Engineering, 2001, pp:135-147 [Conf ] Engin Kirda , Clemens Kerer MyXML: An XML based template engine for the generation of flexible web content. [Citation Graph (0, 0)][DBLP ] WebNet, 2000, pp:317-322 [Conf ] Pascal Fenkam , Schahram Dustdar , Engin Kirda , Gerald Reif , Harald Gall Towards an Access Control System for Mobile Peer-to-Peer Collaborative Environments. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:95-102 [Conf ] Pascal Fenkam , Engin Kirda , Schahram Dustdar , Harald Gall , Gerald Reif Evaluation of a Publish/Subscribe System for Collaborative and Mobile Working. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:23-28 [Conf ] Engin Kirda , Clemens Kerer , Mehdi Jazayeri , Christopher Krügel Supporting Multi-Device Enabled Web Services: Challenges and Open Problems. [Citation Graph (0, 0)][DBLP ] WETICE, 2001, pp:49-54 [Conf ] Gerald Reif , Engin Kirda , Harald Gall , Pascal Fenkam , Gian Pietro Picco , Gianpaolo Cugola A Web-Based Peer-to-Peer Architecture for Collaborative Nomadic Working. [Citation Graph (0, 0)][DBLP ] WETICE, 2001, pp:334-339 [Conf ] Zorlu Yalniz , Engin Kirda Supporting Collaboration in the Development of Tools and Dies in Manufacturing Networks. [Citation Graph (0, 0)][DBLP ] WETICE, 2003, pp:87-0 [Conf ] Engin Kirda , Clemens Kerer , Mehdi Jazayeri , Harald Gall , Roman Kurmanowytsch The Evolution of an Organizational Web Site: Migrating to XML/XSL. [Citation Graph (0, 0)][DBLP ] WSE, 2001, pp:62-69 [Conf ] Stefan Kals , Engin Kirda , Christopher Krügel , Nenad Jovanovic SecuBat: a web vulnerability scanner. [Citation Graph (0, 0)][DBLP ] WWW, 2006, pp:247-256 [Conf ] Engin Kirda , Christopher Krügel Protecting Users against Phishing Attacks. [Citation Graph (0, 0)][DBLP ] Comput. J., 2006, v:49, n:5, pp:554-561 [Journal ] Engin Kirda , Mehdi Jazayeri , Clemens Kerer , Markus W. Schranz Experiences in Engineering Flexible Web Services. [Citation Graph (0, 0)][DBLP ] IEEE MultiMedia, 2001, v:8, n:1, pp:58-65 [Journal ] Engin Kirda , Harald Gall A Service Architecture for Mobile Teamwork. [Citation Graph (0, 0)][DBLP ] International Journal of Software Engineering and Knowledge Engineering, 2003, v:13, n:4, pp:447-467 [Journal ] Clemens Kerer , Engin Kirda , Roman Kurmanowytsch A Generic Content-Management Tool for Web Databases. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2002, v:6, n:4, pp:38-42 [Journal ] Ulrich Bayer , Andreas Moser , Christopher Krügel , Engin Kirda Dynamic Analysis of Malicious Code. [Citation Graph (0, 0)][DBLP ] Journal in Computer Virology, 2006, v:2, n:1, pp:67-77 [Journal ] Christian Ludl , Sean McAllister , Engin Kirda , Christopher Kruegel On the Effectiveness of Techniques to Detect Phishing Sites. [Citation Graph (0, 0)][DBLP ] DIMVA, 2007, pp:20-39 [Conf ] Thomas Raffetseder , Christopher Krügel , Engin Kirda Detecting System Emulators. [Citation Graph (0, 0)][DBLP ] ISC, 2007, pp:1-18 [Conf ] Limits of Static Analysis for Malware Detection. [Citation Graph (, )][DBLP ] Secure Input for Web Applications. [Citation Graph (, )][DBLP ] FIRE: FInding Rogue nEtworks. [Citation Graph (, )][DBLP ] Panorama: capturing system-wide information flow for malware detection and analysis. [Citation Graph (, )][DBLP ] A solution for the automated detection of clickjacking attacks. [Citation Graph (, )][DBLP ] 08102 Working Group -- Requirements for Network Monitoring from an IDS Perspective. [Citation Graph (, )][DBLP ] 8102 Working Group -- Attack Taxonomy. [Citation Graph (, )][DBLP ] Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks. [Citation Graph (, )][DBLP ] Automatically Generating Models for Botnet Detection. [Citation Graph (, )][DBLP ] Achieving Life-Cycle Compliance of Service-Oriented Architectures: Open Issues and Challenges. [Citation Graph (, )][DBLP ] Automated Spyware Collection and Analysis. [Citation Graph (, )][DBLP ] Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. [Citation Graph (, )][DBLP ] Automatic Network Protocol Analysis. [Citation Graph (, )][DBLP ] Scalable, Behavior-Based Malware Clustering. [Citation Graph (, )][DBLP ] Precise alias analysis for static detection of web application vulnerabilities. [Citation Graph (, )][DBLP ] Leveraging User Interactions for In-Depth Testing of Web Applications. [Citation Graph (, )][DBLP ] Abusing Social Networks for Automated User Profiling. [Citation Graph (, )][DBLP ] CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms. [Citation Graph (, )][DBLP ] Improving the efficiency of dynamic malware analysis. [Citation Graph (, )][DBLP ] Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries. [Citation Graph (, )][DBLP ] Identifying Dormant Functionality in Malware Programs. [Citation Graph (, )][DBLP ] A Practical Attack to De-anonymize Social Network Users. [Citation Graph (, )][DBLP ] Prospex: Protocol Specification Extraction. [Citation Graph (, )][DBLP ] Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. [Citation Graph (, )][DBLP ] Dynamic Spyware Analysis. [Citation Graph (, )][DBLP ] All your contacts are belong to us: automated identity theft attacks on social networks. [Citation Graph (, )][DBLP ] Client-side cross-site scripting protection. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.007secs