|
Search the dblp DataBase
Holger Dreger:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Holger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer
Operational experiences with high-volume network intrusion detection. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:2-11 [Conf]
- Holger Dreger, Christian Kreibich, Vern Paxson, Robin Sommer
Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context. [Citation Graph (0, 0)][DBLP] DIMVA, 2005, pp:206-221 [Conf]
- Andy Rupp, Holger Dreger, Anja Feldmann, Robin Sommer
Packet trace manipulation rramework for test labs. [Citation Graph (0, 0)][DBLP] Internet Measurement Conference, 2004, pp:251-256 [Conf]
- Stefan Kornexl, Vern Paxson, Holger Dreger, Anja Feldmann, Robin Sommer
Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic. [Citation Graph (0, 0)][DBLP] Internet Measurment Conference, 2005, pp:267-272 [Conf]
- Jörg Wallerich, Holger Dreger, Anja Feldmann, Balachander Krishnamurthy, Walter Willinger
A methodology for studying persistency aspects of internet flows. [Citation Graph (0, 0)][DBLP] Computer Communication Review, 2005, v:35, n:2, pp:23-36 [Journal]
Predicting the Resource Consumption of Network Intrusion Detection Systems. [Citation Graph (, )][DBLP]
Enriching network security analysis with time travel. [Citation Graph (, )][DBLP]
Predicting the resource consumption of network intrusion detection systems. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|