2008 |
8 | EE | Holger Dreger,
Anja Feldmann,
Vern Paxson,
Robin Sommer:
Predicting the Resource Consumption of Network Intrusion Detection Systems.
RAID 2008: 135-154 |
7 | EE | Gregor Maier,
Robin Sommer,
Holger Dreger,
Anja Feldmann,
Vern Paxson,
Fabian Schneider:
Enriching network security analysis with time travel.
SIGCOMM 2008: 183-194 |
6 | EE | Holger Dreger,
Anja Feldmann,
Vern Paxson,
Robin Sommer:
Predicting the resource consumption of network intrusion detection systems.
SIGMETRICS 2008: 437-438 |
2005 |
5 | EE | Holger Dreger,
Christian Kreibich,
Vern Paxson,
Robin Sommer:
Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context.
DIMVA 2005: 206-221 |
4 | EE | Stefan Kornexl,
Vern Paxson,
Holger Dreger,
Anja Feldmann,
Robin Sommer:
Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic.
Internet Measurment Conference 2005: 267-272 |
3 | EE | Jörg Wallerich,
Holger Dreger,
Anja Feldmann,
Balachander Krishnamurthy,
Walter Willinger:
A methodology for studying persistency aspects of internet flows.
Computer Communication Review 35(2): 23-36 (2005) |
2004 |
2 | EE | Holger Dreger,
Anja Feldmann,
Vern Paxson,
Robin Sommer:
Operational experiences with high-volume network intrusion detection.
ACM Conference on Computer and Communications Security 2004: 2-11 |
1 | EE | Andy Rupp,
Holger Dreger,
Anja Feldmann,
Robin Sommer:
Packet trace manipulation rramework for test labs.
Internet Measurement Conference 2004: 251-256 |