The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Engin Kirda: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Engin Kirda, Clemens Kerer
    DIWE: A Framework for Constructing Device-Independent Web Applications. [Citation Graph (0, 0)][DBLP]
    UMICS, 2004, pp:96-110 [Conf]
  2. Roman Kurmanowytsch, Engin Kirda, Clemens Kerer, Schahram Dustdar
    OMNIX: A Topology-Independent P2P Middleware. [Citation Graph (0, 0)][DBLP]
    CAiSE Workshops, 2003, pp:- [Conf]
  3. Clemens Kerer, Engin Kirda, Mehdi Jazayeri, Roman Kurmanowytsch
    Building and Managing XML/XSL-powered Web Sites: an Experience Report. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2001, pp:547-554 [Conf]
  4. Engin Kirda, Harald Gall, Pascal Fenkam, Gerald Reif
    MOTION: A Peer-to-Peer Platform for Mobile Teamwork Support. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2002, pp:1115-1117 [Conf]
  5. Engin Kirda, Christopher Krügel
    Protecting Users Against Phishing Attacks with AntiPhish. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:517-524 [Conf]
  6. Manuel Egele, Martin Szydlowski, Engin Kirda, Christopher Krügel
    Using Static Program Analysis to Aid Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2006, pp:17-36 [Conf]
  7. Engin Kirda, Clemens Kerer, Christopher Krügel, Roman Kurmanowytsch
    Web Service Engineering with DIWE. [Citation Graph (0, 0)][DBLP]
    EUROMICRO, 2003, pp:283-290 [Conf]
  8. Engin Kirda, Gerald Reif, Harald Gall, Pascal Fenkam
    TWSAPI: A Generic Teamwork Services Application Programming Interface. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2002, pp:365-372 [Conf]
  9. Engin Kirda
    Web Engineering Device Independent Web Services. [Citation Graph (0, 0)][DBLP]
    ICSE, 2001, pp:795-796 [Conf]
  10. Clemens Kerer, Engin Kirda
    XGuide - Concurrent Web Engineering with Contracts. [Citation Graph (0, 0)][DBLP]
    ICWE, 2004, pp:88-92 [Conf]
  11. Patrick Klinkoff, Christopher Krügel, Engin Kirda, Giovanni Vigna
    Extending .NET Security to Unmanaged Code. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:1-16 [Conf]
  12. Christopher Krügel, Thomas Toth, Engin Kirda
    SPARTA, a Mobile Agent Based Instrusion Detection System. [Citation Graph (0, 0)][DBLP]
    Network Security, 2001, pp:187-200 [Conf]
  13. Clemens Kerer, Engin Kirda, Christopher Krügel
    XGuide - A Practical Guide to XML-Based Web Engineering. [Citation Graph (0, 0)][DBLP]
    NETWORKING Workshops, 2002, pp:104-117 [Conf]
  14. Roman Kurmanowytsch, Mehdi Jazayeri, Engin Kirda
    Towards a Hierarchical, Semantic Peer-to-Peer Topology. [Citation Graph (0, 0)][DBLP]
    Peer-to-Peer Computing, 2002, pp:167-168 [Conf]
  15. Christopher Krügel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna
    Polymorphic Worm Detection Using Structural Information of Executables. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:207-226 [Conf]
  16. Engin Kirda, Christopher Krügel, Giovanni Vigna, Nenad Jovanovic
    Noxes: a client-side solution for mitigating cross-site scripting attacks. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:330-337 [Conf]
  17. Christopher Krügel, Thomas Toth, Engin Kirda
    Service specific anomaly detection for network intrusion detection. [Citation Graph (0, 0)][DBLP]
    SAC, 2002, pp:201-208 [Conf]
  18. Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Engin Kirda
    An anomaly-driven reverse proxy for web applications. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:361-368 [Conf]
  19. Sagar Chaki, Pascal Fenkam, Harald Gall, Somesh Jha, Engin Kirda, Helmut Veith
    Integrating Publish/Subscribe into a Mobile Teamwork Support Platform. [Citation Graph (0, 0)][DBLP]
    SEKE, 2003, pp:510-517 [Conf]
  20. Engin Kirda, Pascal Fenkam, Gerald Reif, Harald Gall
    A service architecture for mobile teamwork. [Citation Graph (0, 0)][DBLP]
    SEKE, 2002, pp:513-518 [Conf]
  21. Engin Kirda
    Engineering of Web services with XML and XSL. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2001, pp:318-319 [Conf]
  22. Nenad Jovanovic, Christopher Krügel, Engin Kirda
    Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper). [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:258-263 [Conf]
  23. Andreas Moser, Christopher Krügel, Engin Kirda
    Exploring Multiple Execution Paths for Malware Analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:231-245 [Conf]
  24. Clemens Kerer, Engin Kirda
    Layout, Content and Logic Separation in Web Engineering. [Citation Graph (0, 0)][DBLP]
    Web Engineering, 2001, pp:135-147 [Conf]
  25. Engin Kirda, Clemens Kerer
    MyXML: An XML based template engine for the generation of flexible web content. [Citation Graph (0, 0)][DBLP]
    WebNet, 2000, pp:317-322 [Conf]
  26. Pascal Fenkam, Schahram Dustdar, Engin Kirda, Gerald Reif, Harald Gall
    Towards an Access Control System for Mobile Peer-to-Peer Collaborative Environments. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:95-102 [Conf]
  27. Pascal Fenkam, Engin Kirda, Schahram Dustdar, Harald Gall, Gerald Reif
    Evaluation of a Publish/Subscribe System for Collaborative and Mobile Working. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:23-28 [Conf]
  28. Engin Kirda, Clemens Kerer, Mehdi Jazayeri, Christopher Krügel
    Supporting Multi-Device Enabled Web Services: Challenges and Open Problems. [Citation Graph (0, 0)][DBLP]
    WETICE, 2001, pp:49-54 [Conf]
  29. Gerald Reif, Engin Kirda, Harald Gall, Pascal Fenkam, Gian Pietro Picco, Gianpaolo Cugola
    A Web-Based Peer-to-Peer Architecture for Collaborative Nomadic Working. [Citation Graph (0, 0)][DBLP]
    WETICE, 2001, pp:334-339 [Conf]
  30. Zorlu Yalniz, Engin Kirda
    Supporting Collaboration in the Development of Tools and Dies in Manufacturing Networks. [Citation Graph (0, 0)][DBLP]
    WETICE, 2003, pp:87-0 [Conf]
  31. Engin Kirda, Clemens Kerer, Mehdi Jazayeri, Harald Gall, Roman Kurmanowytsch
    The Evolution of an Organizational Web Site: Migrating to XML/XSL. [Citation Graph (0, 0)][DBLP]
    WSE, 2001, pp:62-69 [Conf]
  32. Stefan Kals, Engin Kirda, Christopher Krügel, Nenad Jovanovic
    SecuBat: a web vulnerability scanner. [Citation Graph (0, 0)][DBLP]
    WWW, 2006, pp:247-256 [Conf]
  33. Engin Kirda, Christopher Krügel
    Protecting Users against Phishing Attacks. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2006, v:49, n:5, pp:554-561 [Journal]
  34. Engin Kirda, Mehdi Jazayeri, Clemens Kerer, Markus W. Schranz
    Experiences in Engineering Flexible Web Services. [Citation Graph (0, 0)][DBLP]
    IEEE MultiMedia, 2001, v:8, n:1, pp:58-65 [Journal]
  35. Engin Kirda, Harald Gall
    A Service Architecture for Mobile Teamwork. [Citation Graph (0, 0)][DBLP]
    International Journal of Software Engineering and Knowledge Engineering, 2003, v:13, n:4, pp:447-467 [Journal]
  36. Clemens Kerer, Engin Kirda, Roman Kurmanowytsch
    A Generic Content-Management Tool for Web Databases. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2002, v:6, n:4, pp:38-42 [Journal]
  37. Ulrich Bayer, Andreas Moser, Christopher Krügel, Engin Kirda
    Dynamic Analysis of Malicious Code. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2006, v:2, n:1, pp:67-77 [Journal]
  38. Christian Ludl, Sean McAllister, Engin Kirda, Christopher Kruegel
    On the Effectiveness of Techniques to Detect Phishing Sites. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2007, pp:20-39 [Conf]
  39. Thomas Raffetseder, Christopher Krügel, Engin Kirda
    Detecting System Emulators. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:1-18 [Conf]

  40. Limits of Static Analysis for Malware Detection. [Citation Graph (, )][DBLP]


  41. Secure Input for Web Applications. [Citation Graph (, )][DBLP]


  42. FIRE: FInding Rogue nEtworks. [Citation Graph (, )][DBLP]


  43. Panorama: capturing system-wide information flow for malware detection and analysis. [Citation Graph (, )][DBLP]


  44. A solution for the automated detection of clickjacking attacks. [Citation Graph (, )][DBLP]


  45. 08102 Working Group -- Requirements for Network Monitoring from an IDS Perspective. [Citation Graph (, )][DBLP]


  46. 8102 Working Group -- Attack Taxonomy. [Citation Graph (, )][DBLP]


  47. Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks. [Citation Graph (, )][DBLP]


  48. Automatically Generating Models for Botnet Detection. [Citation Graph (, )][DBLP]


  49. Achieving Life-Cycle Compliance of Service-Oriented Architectures: Open Issues and Challenges. [Citation Graph (, )][DBLP]


  50. Automated Spyware Collection and Analysis. [Citation Graph (, )][DBLP]


  51. Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. [Citation Graph (, )][DBLP]


  52. Automatic Network Protocol Analysis. [Citation Graph (, )][DBLP]


  53. Scalable, Behavior-Based Malware Clustering. [Citation Graph (, )][DBLP]


  54. Precise alias analysis for static detection of web application vulnerabilities. [Citation Graph (, )][DBLP]


  55. Leveraging User Interactions for In-Depth Testing of Web Applications. [Citation Graph (, )][DBLP]


  56. Abusing Social Networks for Automated User Profiling. [Citation Graph (, )][DBLP]


  57. CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms. [Citation Graph (, )][DBLP]


  58. Improving the efficiency of dynamic malware analysis. [Citation Graph (, )][DBLP]


  59. Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries. [Citation Graph (, )][DBLP]


  60. Identifying Dormant Functionality in Malware Programs. [Citation Graph (, )][DBLP]


  61. A Practical Attack to De-anonymize Social Network Users. [Citation Graph (, )][DBLP]


  62. Prospex: Protocol Specification Extraction. [Citation Graph (, )][DBLP]


  63. Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. [Citation Graph (, )][DBLP]


  64. Dynamic Spyware Analysis. [Citation Graph (, )][DBLP]


  65. All your contacts are belong to us: automated identity theft attacks on social networks. [Citation Graph (, )][DBLP]


  66. Client-side cross-site scripting protection. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.007secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002