2008 |
12 | EE | Chris Kanich,
Christian Kreibich,
Kirill Levchenko,
Brandon Enright,
Geoffrey M. Voelker,
Vern Paxson,
Stefan Savage:
Spamalytics: an empirical analysis of spam marketing conversion.
ACM Conference on Computer and Communications Security 2008: 3-14 |
11 | EE | Leo Juan,
Christian Kreibich,
Chih-Hung Lin,
Vern Paxson:
A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems.
DIMVA 2008: 267-278 |
10 | EE | Mark Allman,
Christian Kreibich,
Vern Paxson,
Robin Sommer,
Nicholas Weaver:
Principles for Developing Comprehensive Network Visibility.
HotSec 2008 |
9 | EE | Christian Kreibich,
Chris Kanich,
Kirill Levchenko,
Brandon Enright,
Geoffrey M. Voelker,
Vern Paxson,
Stefan Savage:
On the Spam Campaign Trail.
LEET 2008 |
2006 |
8 | EE | Christian Kreibich,
Jon Crowcroft:
Efficient sequence alignment of network traffic.
Internet Measurement Conference 2006: 307-312 |
7 | EE | Justin Ma,
Kirill Levchenko,
Christian Kreibich,
Stefan Savage,
Geoffrey M. Voelker:
Unexpected means of protocol inference.
Internet Measurement Conference 2006: 313-326 |
6 | EE | Jon Crowcroft,
Christian Kreibich:
Only 365 days left until the Sigcomm deadline.
Computer Communication Review 36(5): 57-62 (2006) |
2005 |
5 | EE | Holger Dreger,
Christian Kreibich,
Vern Paxson,
Robin Sommer:
Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context.
DIMVA 2005: 206-221 |
4 | EE | Christian Kreibich,
Robin Sommer:
Policy-Controlled Event Management for Distributed Intrusion Detection.
ICDCS Workshops 2005: 385-391 |
3 | EE | Christian Kreibich:
Brooery: A Graphical Environment for Analysis of Security-Relevant Network Activity.
USENIX Annual Technical Conference, FREENIX Track 2005: 109-118 |
2004 |
2 | EE | Christian Kreibich:
Design and Implementation of Netdude, a Framework for Packet Trace Manipulation (Awarded Best Student Paper!).
USENIX Annual Technical Conference, FREENIX Track 2004: 63-72 |
1 | EE | Christian Kreibich,
Jon Crowcroft:
Honeycomb: creating intrusion detection signatures using honeypots.
Computer Communication Review 34(1): 51-56 (2004) |