Cynthia Wagner

According to our database1, Cynthia Wagner authored at least 21 papers between 2007 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Decaying Indicators of Compromise.
CoRR, 2018

2016
MISP: The Design and Implementation of a Collaborative Threat Intelligence Sharing Platform.
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016

2013
ASMATRA: Ranking ASs providing transit service to malware hosters.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

2012
Breaking Tor anonymity with game theory and data mining.
Concurr. Comput. Pract. Exp., 2012

SDBF: Smart DNS brute-forcer.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

DNSSM: A large scale passive DNS security monitoring framework.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

SAFEM: Scalable analysis of flows with entropic measures and SVM.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Semantic Exploration of DNS.
Proceedings of the NETWORKING 2012, 2012

Detecting Anomalies in Netflow Record Time Series by Using a Kernel Function.
Proceedings of the Dependable Networks and Services, 2012

2011
DANAK: Finding the odd!
Proceedings of the 5th International Conference on Network and System Security, 2011

Machine Learning Approach for IP-Flow Record Anomaly Detection.
Proceedings of the NETWORKING 2011, 2011

Digging into IP Flow Records with a Visual Kernel Method.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

2010
PeekKernelFlows: peeking into IP flows.
Proceedings of the 7th International Symposium on Visualization for Cyber Security, 2010

Game theory driven monitoring of spatial-aggregated IP-Flow records.
Proceedings of the 6th International Conference on Network and Service Management, 2010

Monitoring of Spatial-Aggregated IP-Flow Records.
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010

2009
Symbolic Computing with Incremental Mindmaps to Manage and Mine Data Streams - Some Applications
CoRR, 2009

Malware analysis with graph kernels and support vector machines.
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009

2008
CoZo+ - A Content Zoning Engine for textual documents
CoRR, 2008

Symbolic Computing with Incremental Mind-maps to Manage and Mine Data Streams - Some Applications.
Proceedings of the Fourth International Workshop on Neural-Symbolic Learning and Reasoning, 2008

2007
CoZo - Content Zoning for Spam Emails.
Proceedings of the WEBIST 2007, 2007

Semi-automated Content Zoning of Spam Emails.
Proceedings of the Web Information Systems and Technologies, 2007


  Loading...