dblp.uni-trier.dewww.uni-trier.de

Holger Dreger

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
8EEHolger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer: Predicting the Resource Consumption of Network Intrusion Detection Systems. RAID 2008: 135-154
7EEGregor Maier, Robin Sommer, Holger Dreger, Anja Feldmann, Vern Paxson, Fabian Schneider: Enriching network security analysis with time travel. SIGCOMM 2008: 183-194
6EEHolger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer: Predicting the resource consumption of network intrusion detection systems. SIGMETRICS 2008: 437-438
2005
5EEHolger Dreger, Christian Kreibich, Vern Paxson, Robin Sommer: Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context. DIMVA 2005: 206-221
4EEStefan Kornexl, Vern Paxson, Holger Dreger, Anja Feldmann, Robin Sommer: Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic. Internet Measurment Conference 2005: 267-272
3EEJörg Wallerich, Holger Dreger, Anja Feldmann, Balachander Krishnamurthy, Walter Willinger: A methodology for studying persistency aspects of internet flows. Computer Communication Review 35(2): 23-36 (2005)
2004
2EEHolger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer: Operational experiences with high-volume network intrusion detection. ACM Conference on Computer and Communications Security 2004: 2-11
1EEAndy Rupp, Holger Dreger, Anja Feldmann, Robin Sommer: Packet trace manipulation rramework for test labs. Internet Measurement Conference 2004: 251-256

Coauthor Index

1Anja Feldmann [1] [2] [3] [4] [6] [7] [8]
2Stefan Kornexl [4]
3Christian Kreibich [5]
4Balachander Krishnamurthy [3]
5Gregor Maier [7]
6Vern Paxson [2] [4] [5] [6] [7] [8]
7Andy Rupp [1]
8Fabian Schneider [7]
9Robin Sommer [1] [2] [4] [5] [6] [7] [8]
10Jörg Wallerich [3]
11Walter Willinger [3]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)