Sven Dietrich
Sven Dietrich
Professor, Hunter College & The Graduate Center, CUNY
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα hunter.cuny.edu - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Internet denial of service: attack and defense mechanisms (Radia Perlman Computer Networking and Security)
J Mirkovic, S Dietrich, D Dittrich, P Reiher
Prentice Hall PTR, 2004
5592004
Analyzing Distributed Denial of Service Tools: The Shaft Case.
S Dietrich, N Long, D Dittrich
LISA, 329-339, 2000
2172000
Analysis of the Storm and Nugache Trojans: P2P is here
S Stover, D Dittrich, J Hernandez, S Dietrich
USENIX; login 32 (6), 18-27, 2007
1742007
P2P as botnet command and control: a deeper insight
D Dittrich, S Dietrich
2008 3rd International Conference on Malicious and Unwanted Software …, 2008
1542008
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts
B Coskun, S Dietrich, N Memon
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
1132010
The mstream distributed denial of service attack tool
D Dittrich, G Weaver, S Dietrich, N Long
79*2000
Security challenges and opportunities of software-defined networking
MC Dacier, H König, R Cwalinski, F Kargl, S Dietrich
IEEE Security & Privacy 15 (2), 96-100, 2017
692017
Detecting zero-day attacks using context-aware anomaly detection at the application-layer
P Duessel, C Gehl, U Flegel, S Dietrich, M Meier
International Journal of Information Security 16 (5), 475-490, 2017
452017
SkyNET: A 3G-Enabled Mobile Attack Drone and Stealth Botmaster.
T Reed, J Geis, S Dietrich
WOOT, 28-36, 2011
392011
Discovery techniques for P2P botnets
D Dittrich, S Dietrich
Stevens Institute of Technology CS Technical Report 4 (26), 2, 2008
332008
Re-evaluating the wisdom of crowds in assessing web security
PH Chia, SJ Knapskog
International Conference on Financial Cryptography and Data Security, 299-314, 2011
32*2011
Re-evaluating the wisdom of crowds in assessing web security
PH Chia, SJ Knapskog
International Conference on Financial Cryptography and Data Security, 299-314, 2011
32*2011
An Analysis of the” shaft” distributed denial of service tool
S Dietrich, N Long, D Dittrich
Proceedings of LISA 2000, 2000
322000
Towards community standards for ethical behavior in computer security research
D Dittrich, M Bailey, S Dietrich
University of Washington, Michael Bailey, University of Michigan, Sven …, 2009
302009
Building an active computer security ethics community
D Dittrich, M Bailey, S Dietrich
IEEE Security & Privacy 9 (4), 32-40, 2010
292010
Financial cryptography and data security
G Danezis
Springer Berlin Heidelberg, 2012
242012
Command and control structures in malware
D Dittrich, S Dietrich
Usenix magazine 32 (6), 2007
242007
New directions in peer-to-peer malware
D Dittrich, S Dietrich
2008 IEEE Sarnoff Symposium, 1-5, 2008
162008
A formal analysis of the secure sockets layer protocol
S Dietrich
PhDthesis, Dept. Mathematics andComputerScience, Adelphi University, April1997, 1997
161997
Ethics in data sharing: developing a model for best practice
S Dietrich, J Van Der Ham, A Pras, R van Rijswijk Deij, D Shou, ...
2014 IEEE Security and Privacy Workshops, 5-9, 2014
142014
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20