The SCEAS System
Navigation Menu

Search the dblp DataBase


Holger Dreger: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Holger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer
    Operational experiences with high-volume network intrusion detection. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:2-11 [Conf]
  2. Holger Dreger, Christian Kreibich, Vern Paxson, Robin Sommer
    Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2005, pp:206-221 [Conf]
  3. Andy Rupp, Holger Dreger, Anja Feldmann, Robin Sommer
    Packet trace manipulation rramework for test labs. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Conference, 2004, pp:251-256 [Conf]
  4. Stefan Kornexl, Vern Paxson, Holger Dreger, Anja Feldmann, Robin Sommer
    Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic. [Citation Graph (0, 0)][DBLP]
    Internet Measurment Conference, 2005, pp:267-272 [Conf]
  5. Jörg Wallerich, Holger Dreger, Anja Feldmann, Balachander Krishnamurthy, Walter Willinger
    A methodology for studying persistency aspects of internet flows. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2005, v:35, n:2, pp:23-36 [Journal]

  6. Predicting the Resource Consumption of Network Intrusion Detection Systems. [Citation Graph (, )][DBLP]

  7. Enriching network security analysis with time travel. [Citation Graph (, )][DBLP]

  8. Predicting the resource consumption of network intrusion detection systems. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002