Christian Seifert

Orcid: 0000-0001-9182-8687

According to our database1, Christian Seifert authored at least 30 papers between 2007 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Observability for Non-autonomous Systems.
SIAM J. Control. Optim., February, 2023

Secure Data Acquisition for Battery Management Systems.
Proceedings of the 26th Euromicro Conference on Digital System Design, 2023

2022
Trust your BMS: Designing a Lightweight Authentication Architecture for Industrial Networks.
Proceedings of the IEEE International Conference on Industrial Technology, 2022

Long-Term Study of Honeypots in a Public Cloud.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
Living-Off-The-Land Command Detection Using Active Learning.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

2020
Sufficient Criteria and Sharp Geometric Conditions for Observability in Banach Spaces.
SIAM J. Control. Optim., 2020

Multi-Layered IoT System Design Towards End-to-End Secure Communication.
Proceedings of the 46th Annual Conference of the IEEE Industrial Electronics Society, 2020

2019
Detection of Prevalent Malware Families with Deep Learning.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Detecting Cyber Attacks Using Anomaly Detection with Explanations and Expert Feedback.
Proceedings of the IEEE International Conference on Acoustics, 2019

2016
MART: Targeted attack detection on a compromised network.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

2015
Dynamic Allostery of the Catabolite Activator Protein Revealed by Interatomic Forces.
PLoS Comput. Biol., 2015

2014
An Allosteric Signaling Pathway of Human 3-Phosphoglycerate Kinase from Force Distribution Analysis.
PLoS Comput. Biol., 2014

2013
Robust scareware image detection.
Proceedings of the IEEE International Conference on Acoustics, 2013

2012
Rozzle: De-cloaking Internet Malware.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

2011
Implementation of Force Distribution Analysis for Molecular Dynamics simulations.
BMC Bioinform., 2011

ARROW: GenerAting SignatuRes to Detect DRive-By DOWnloads.
Proceedings of the 20th International Conference on World Wide Web, 2011

ZOZZLE: Fast and Precise In-Browser JavaScript Malware Detection.
Proceedings of the 20th USENIX Security Symposium, 2011

2010
Assessment of Virtualization as a Sensor Technique.
Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010

WebCop: Locating Neighborhoods of Malware on the Web.
Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010

Drive-by-Downloads.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2009
True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots.
Proceedings of the Third International Conference on Emerging Security Information, 2009

Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks.
Proceedings of the Foundations of Augmented Cognition. Neuroergonomics and Operational Neuroscience, 2009

Automating Malware Scanning Using Workflows.
Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, 2009

Measurement Study on Malicious Web Servers in the .nz Domain.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
Single-trial coupling of EEG and fMRI reveals the involvement of early anterior cingulate cortex activation in effortful decision making.
NeuroImage, 2008

Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Identification of malicious web pages through analysis of underlying DNS and web server relationships.
Proceedings of the LCN 2008, 2008

Identifying and Analyzing Web Server Attacks.
Proceedings of the Advances in Digital Forensics IV, 2008

2007
Capture - A behavioral analysis tool for applications and documents.
Digit. Investig., 2007

Grid Enabled Internet Instruments.
Proceedings of the Global Communications Conference, 2007


  Loading...