2008 |
11 | EE | Konrad Rieck,
Thorsten Holz,
Carsten Willems,
Patrick Düssel,
Pavel Laskov:
Learning and Classification of Malware Behavior.
DIMVA 2008: 108-125 |
10 | EE | Patrick Düssel,
Christian Gehl,
Pavel Laskov,
Konrad Rieck:
Incorporation of Application Layer Protocol Syntax into Anomaly Detection.
ICISS 2008: 188-202 |
9 | EE | Konrad Rieck,
Stefan Wahl,
Pavel Laskov,
Peter Domschitz,
Klaus-Robert Müller:
A Self-learning System for Detection of Anomalous SIP Messages.
IPTComm 2008: 90-106 |
8 | EE | Lothar Braun,
Falko Dressler,
Thorsten Holz,
Engin Kirda,
Jan Kohlrausch,
Christopher Kruegel,
Tobias Limmer,
Konrad Rieck,
James P. G. Sterbenz:
08102 Working Group -- Requirements for Network Monitoring from an IDS Perspective.
Network Attack Detection and Defense 2008 |
7 | EE | Marc Dacier,
Hervé Debar,
Thorsten Holz,
Engin Kirda,
Jan Kohlrausch,
Christopher Kruegel,
Konrad Rieck,
James P. G. Sterbenz:
8102 Working Group -- Attack Taxonomy.
Network Attack Detection and Defense 2008 |
2007 |
6 | EE | Konrad Rieck,
Pavel Laskov:
Language models for detection of unknown attacks in network traffic.
Journal in Computer Virology 2(4): 243-256 (2007) |
2006 |
5 | EE | Konrad Rieck,
Pavel Laskov,
Klaus-Robert Müller:
Efficient Algorithms for Similarity Measures over Sequential Data: A Look Beyond Kernels.
DAGM-Symposium 2006: 374-383 |
4 | EE | Konrad Rieck,
Pavel Laskov:
Detecting Unknown Network Attacks Using Language Models.
DIMVA 2006: 74-90 |
3 | EE | Konrad Rieck,
Pavel Laskov,
Sören Sonnenburg:
Computation of Similarity Measures for Sequential Data using Generalized Suffix Trees.
NIPS 2006: 1177-1184 |
2005 |
2 | EE | Pavel Laskov,
Patrick Düssel,
Christin Schäfer,
Konrad Rieck:
Learning Intrusion Detection: Supervised or Unsupervised?.
ICIAP 2005: 50-57 |
1 | | Pavel Laskov,
Konrad Rieck,
Christin Schäfer,
Klaus-Robert Müller:
Visualization of anomaly detection using prediction sensitivity.
Sicherheit 2005: 197-208 |