Sven Dietrich
Sven Dietrich
Professor, Hunter College & The Graduate Center, CUNY
Verified email at hunter.cuny.edu - Homepage
Title
Cited by
Cited by
Year
Internet denial of service: attack and defense mechanisms (Radia Perlman Computer Networking and Security)
J Mirkovic, S Dietrich, D Dittrich, P Reiher
Prentice Hall PTR, 2004
5302004
Analyzing Distributed Denial of Service Tools: The Shaft Case.
S Dietrich, N Long, D Dittrich
LISA, 329-339, 2000
2022000
Analysis of the Storm and Nugache Trojans: P2P is here
S Stover, D Dittrich, J Hernandez, S Dietrich
USENIX; login 32 (6), 18-27, 2007
1612007
P2P as botnet command and control: a deeper insight
D Dittrich, S Dietrich
2008 3rd International Conference on Malicious and Unwanted Software …, 2008
1482008
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts
B Coskun, S Dietrich, N Memon
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
1052010
The mstream distributed denial of service attack tool
D Dittrich, G Weaver, S Dietrich, N Long
79*2000
Security challenges and opportunities of software-defined networking
MC Dacier, H König, R Cwalinski, F Kargl, S Dietrich
IEEE Security & Privacy 15 (2), 96-100, 2017
582017
SkyNET: A 3G-Enabled Mobile Attack Drone and Stealth Botmaster.
T Reed, J Geis, S Dietrich
WOOT, 28-36, 2011
362011
An Analysis of the” shaft” distributed denial of service tool
S Dietrich, N Long, D Dittrich
Proceedings of LISA 2000, 2000
312000
Re-evaluating the wisdom of crowds in assessing web security
PH Chia, SJ Knapskog
International Conference on Financial Cryptography and Data Security, 299-314, 2011
30*2011
Re-evaluating the wisdom of crowds in assessing web security
PH Chia, SJ Knapskog
International Conference on Financial Cryptography and Data Security, 299-314, 2011
30*2011
Discovery techniques for P2P botnets
D Dittrich, S Dietrich
Stevens Institute of Technology CS Technical Report 4 (26), 2, 2008
302008
Towards community standards for ethical behavior in computer security research
D Dittrich, M Bailey, S Dietrich
University of Washington, Michael Bailey, University of Michigan, Sven …, 2009
292009
Detecting zero-day attacks using context-aware anomaly detection at the application-layer
P Duessel, C Gehl, U Flegel, S Dietrich, M Meier
International Journal of Information Security 16 (5), 475-490, 2017
272017
Building an active computer security ethics community
D Dittrich, M Bailey, S Dietrich
IEEE Security & Privacy 9 (4), 32-40, 2010
272010
Command and control structures in malware
D Dittrich, S Dietrich
Usenix magazine 32 (6), 2007
232007
New directions in peer-to-peer malware
D Dittrich, S Dietrich
2008 IEEE Sarnoff Symposium, 1-5, 2008
162008
A formal analysis of the secure sockets layer protocol
S Dietrich
PhDthesis, Dept. Mathematics andComputerScience, Adelphi University, April1997, 1997
151997
Ethics in data sharing: developing a model for best practice
S Dietrich, J Van Der Ham, A Pras, R van Rijswijk Deij, D Shou, ...
2014 IEEE Security and Privacy Workshops, 5-9, 2014
102014
A secure submission system for online whistleblowing platforms
V Roth, B Güldenring, E Rieffel, S Dietrich, L Ries
International Conference on Financial Cryptography and Data Security, 354-361, 2013
92013
The system can't perform the operation now. Try again later.
Articles 1–20