Christian Platzer

According to our database1, Christian Platzer authored at least 35 papers between 2005 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Discovery.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

2015
"Nice Boots!" - A Large-Scale Analysis of Bootkits and New Ways to Stop Them.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

MARVIN: Efficient and Comprehensive Mobile App Classification through Static and Dynamic Analysis.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2014
Automated Analysis of Underground Marketplaces.
Proceedings of the Advances in Digital Forensics X, 2014

A practical approach for generic bootkit detection and prevention.
Proceedings of the Seventh European Workshop on System Security, 2014

AndRadar: Fast Discovery of Android Applications in Alternative Markets.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

Skin sheriff: a machine learning solution for detecting explicit images.
Proceedings of the 2nd International Workshop on Security and Forensics in Communication Systems, 2014

Prospect: peripheral proxying supported embedded code testing.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Breaking Integrated Circuit Device Security through Test Mode Silicon Reverse Engineering.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

ANDRUBIS - 1, 000, 000 Apps Later: A View on Current Android Malware Behaviors.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014

Lobotomy: An Architecture for JIT Spraying Mitigation.
Proceedings of the Ninth International Conference on Availability, 2014

2013
A View to a Kill: WebView Exploitation.
Proceedings of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2013

Cross-platform malware: write once, infect everywhere.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Take a bite - Finding the worm in the Apple.
Proceedings of the 9th International Conference on Information, 2013

2012
Vanity, cracks and malware: insights into the anti-copy protection ecosystem.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Removing web spam links from search engine results.
Journal in Computer Virology, 2011

Detecting malware's failover C&C strategies with squeeze.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

Sequence-based bot detection in massive multiplayer online games.
Proceedings of the 8th International Conference on Information, 2011

2010
Is the Internet for Porn? An Insight Into the Online Adult Industry.
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010

Abusing Social Networks for Automated User Profiling.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection.
Proceedings of the Detection of Intrusions and Malware, 2010

Covertly Probing Underground Economy Marketplaces.
Proceedings of the Detection of Intrusions and Malware, 2010

2009
Discovery.
Proceedings of the Encyclopedia of Database Systems, 2009

Web service clustering using multidimensional angles as proximity measures.
ACM Trans. Internet Techn., 2009

Server-Side Bot Detection in Massively Multiplayer Online Games.
IEEE Security & Privacy, 2009

SWAP: Mitigating XSS attacks using a reverse proxy.
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2009

2007
Large Scale Web Service Discovery and Composition using High Performance In-Memory Indexing.
Proceedings of the 9th IEEE International Conference on E-Commerce Technology (CEC 2007) / 4th IEEE International Conference on Enterprise Computing, 2007

Towards recovering the broken SOA triangle: a software engineering perspective.
Proceedings of the 2nd International Workshop on Service Oriented Software Engineering: in conjunction with the 6th ESEC/FSE joint meeting, 2007

Integrating Quality of Service Aspects in Top-Down Business Process Development Using WS-CDL and WS-BPEL.
Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), 2007

2006
Service QoS Composition at the Level of Part Names.
Proceedings of the Web Services and Formal Methods, Third International Workshop, 2006

Web Service Indexing for Efficient Retrieval and Composition.
Proceedings of the Eighth IEEE International Conference on E-Commerce Technology (CEC 2006) / Third IEEE International Conference on Enterprise Computing, 2006

Bootstrapping Performance and Dependability Attributes of Web Services.
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006

2005
Building an Integrated Pan-European News Distribution Network.
Proceedings of the Collaborative Networks and Their Breeding Environments, 2005

A Vector Space Search Engine forWeb Services.
Proceedings of the 2005 IEEE International Conference on Web Services (ICWS 2005), 2005

Intelligent News Publishing and Distribution through Web Services, Peer-to-peer Technologies and Vector Space Content Relations.
Proceedings of the From Author to Reader: Challenges for the Digital Content Chain: Proceedings of the 9th ICCC International Conference on Electronic Publishing held at Katholieke Universiteit Leuven, 2005


  Loading...