Dietrich, Sven
448  results:
Search for persons X
?
3

Attacks on tomorrow's virtual world:

, In: 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S),
 
?
6

QuickBCC: Quick and Scalable Binary Vulnerable Code Clone D..:

, In: ICT Systems Security and Privacy Protection; IFIP Advances in Information and Communication Technology,
Jang, Hajin ; Yang, Kyeongseok ; Lee, Geonwoo... - p. 66-82 , 2021
 
?
7

Tracing Privilege Misuse Through Behavioral Anomaly Detecti..:

, In: 2020 13th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE),
Duessel, Patrick ; Luo, Shoufu ; Flegel, Ulrich.. - p. 22-31 , 2020
 
?
8

Cybersecurity and the Future:

Dietrich, Sven
Computer.  50 (2017)  4 - p. 7-7 , 2017
 
?
10

Detecting zero-day attacks using context-aware anomaly dete..:

Duessel, Patrick ; Gehl, Christian ; Flegel, Ulrich..
International Journal of Information Security.  16 (2016)  5 - p. 475-490 , 2016
 
?
11

Detection of Intrusions and Malware, and Vulnerability Asse.. 

11th International Conference, DIMVA 2014, Egham, UK, July ...  Lecture Notes in Computer Science ; 8550;SpringerLink, Bücher
 
?
 
?
13

Financial Cryptography and Data Security 

FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire...  Lecture Notes in Computer Science ; 7398;SpringerLink, Bücher
 
?
14

Financial Cryptography and Data Security 

FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lu...  Lecture Notes in Computer Science ; 7126;SpringerLink, Bücher
 
?
15

Building an Active Computer Security Ethics Community:

Dittrich, David ; Bailey, Michael ; Dietrich, Sven
IEEE Security & Privacy Magazine.  9 (2011)  4 - p. 32-40 , 2011
 
1-15