Daniel Fleck

According to our database1, Daniel Fleck authored at least 25 papers between 2009 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Microservices made attack-resilient using unsupervised service fissioning.
Proceedings of the 13th European Workshop on Systems Security, 2020

2018
On early detection of application-level resource exhaustion and starvation.
J. Syst. Softw., 2018

An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance<sup>*</sup>.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018

Moving-Target Defense Against Botnet Reconnaissance and an Adversarial Coupon-Collection Model.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
Changing proxy-server identities as a proactive moving-target defense against reconnaissance for DDoS attacks.
CoRR, 2017

Numerical Evaluation of Cloud-Side Shuffling Defenses against DDoS Attacks on Proxied Multiserver Systems.
CoRR, 2017

Practical and Accurate Runtime Application Protection Against DoS Attacks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Preliminary study of fission defenses against low-volume DoS attacks on proxied multiserver systems.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017

Detecting ROP with Statistical Learning of Program Characteristics.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

Cloud-Side Shuffling Defenses against DDoS Attacks on Proxied Multiserver Systems.
Proceedings of the 9th Cloud Computing Security Workshop, 2017

Strict Virtual Call Integrity Checking for C++ Binaries.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
On the Move: Evading Distributed Denial-of-Service Attacks.
Computer, 2016

2015
Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Class-Chord: Efficient Messages to Classes of Nodes in Chord.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
A moving target DDoS defense mechanism.
Comput. Commun., 2014

transAD: An Anomaly Detection Network Intrusion Sensor for the Web.
Proceedings of the Information Security - 17th International Conference, 2014

Catch Me If You Can: A Cloud-Enabled DDoS Defense.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

2013
PyTrigger: A System to Trigger & Extract User-Activated Malware Behavior.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2011
Using Grid Based Feature Localization for Fast Image Matching.
Proceedings of the Image Analysis and Recognition - 8th International Conference, 2011

Predicting image matching using affine distortion models.
Proceedings of the 24th IEEE Conference on Computer Vision and Pattern Recognition, 2011

2010
Efficient Affine Image Matching for Building and Maintaining 3D Models.
PhD thesis, 2010

Using Local Affine Invariants to Improve Image Matching.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

2009
An Evaluation of Affine Invariant-Based Classification for Image Matching.
Proceedings of the Advances in Visual Computing, 5th International Symposium, 2009

Affine Invariant-Based Classification of Inliers and Outliers for Image Matching.
Proceedings of the Image Analysis and Recognition, 6th International Conference, 2009


  Loading...