dblp.uni-trier.dewww.uni-trier.de

Christian Kreibich

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
12EEChris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage: Spamalytics: an empirical analysis of spam marketing conversion. ACM Conference on Computer and Communications Security 2008: 3-14
11EELeo Juan, Christian Kreibich, Chih-Hung Lin, Vern Paxson: A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. DIMVA 2008: 267-278
10EEMark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver: Principles for Developing Comprehensive Network Visibility. HotSec 2008
9EEChristian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage: On the Spam Campaign Trail. LEET 2008
2006
8EEChristian Kreibich, Jon Crowcroft: Efficient sequence alignment of network traffic. Internet Measurement Conference 2006: 307-312
7EEJustin Ma, Kirill Levchenko, Christian Kreibich, Stefan Savage, Geoffrey M. Voelker: Unexpected means of protocol inference. Internet Measurement Conference 2006: 313-326
6EEJon Crowcroft, Christian Kreibich: Only 365 days left until the Sigcomm deadline. Computer Communication Review 36(5): 57-62 (2006)
2005
5EEHolger Dreger, Christian Kreibich, Vern Paxson, Robin Sommer: Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context. DIMVA 2005: 206-221
4EEChristian Kreibich, Robin Sommer: Policy-Controlled Event Management for Distributed Intrusion Detection. ICDCS Workshops 2005: 385-391
3EEChristian Kreibich: Brooery: A Graphical Environment for Analysis of Security-Relevant Network Activity. USENIX Annual Technical Conference, FREENIX Track 2005: 109-118
2004
2EEChristian Kreibich: Design and Implementation of Netdude, a Framework for Packet Trace Manipulation (Awarded Best Student Paper!). USENIX Annual Technical Conference, FREENIX Track 2004: 63-72
1EEChristian Kreibich, Jon Crowcroft: Honeycomb: creating intrusion detection signatures using honeypots. Computer Communication Review 34(1): 51-56 (2004)

Coauthor Index

1Mark Allman [10]
2Jon Crowcroft [1] [6] [8]
3Holger Dreger [5]
4Brandon Enright [9] [12]
5Leo Juan [11]
6Chris Kanich [9] [12]
7Kirill Levchenko [7] [9] [12]
8Chih-Hung Lin [11]
9Justin Ma [7]
10Vern Paxson [5] [9] [10] [11] [12]
11Stefan Savage [7] [9] [12]
12Robin Sommer [4] [5] [10]
13Geoffrey M. Voelker [7] [9] [12]
14Nicholas Weaver [10]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)