Fredrik Valeur

According to our database1, Fredrik Valeur authored at least 17 papers between 2002 and 2010.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
An Experience in Testing the Security of Real-World Electronic Voting Systems.
IEEE Trans. Software Eng., 2010

2009
Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries.
J. Comput. Secur., 2009

2008
Are your votes <i>really</i> counted?: testing the security of real-world electronic voting systems.
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2008

2006
Anomalous system call detection.
ACM Trans. Inf. Syst. Secur., 2006

An anomaly-driven reverse proxy for web applications.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Using Hidden Markov Models to Evaluate the Risks of Intrusions.
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006

2005
A Learning-Based Approach to the Detection of SQL Attacks.
Proceedings of the Detection of Intrusions and Malware, 2005

Intrusion Detection and Correlation - Challenges and Solutions
Advances in Information Security 14, Springer, ISBN: 978-0-387-23398-7, 2005

2004
A Comprehensive Approach to Intrusion Detection Alert Correlation.
IEEE Trans. Dependable Secur. Comput., 2004

Static Disassembly of Obfuscated Binaries.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

2003
Designing and implementing a family of intrusion detection systems.
Proceedings of the 11th ACM SIGSOFT Symposium on Foundations of Software Engineering 2003 held jointly with 9th European Software Engineering Conference, 2003

Topology-Based Detection of Anomalous BGP Messages.
Proceedings of the Recent Advances in Intrusion Detection, 6th International Symposium, 2003

Run-time Detection of Heap-based Overflows.
Proceedings of the 17th Conference on Systems Administration (LISA 2003), 2003

On the Detection of Anomalous System Call Arguments.
Proceedings of the Computer Security, 2003

Bayesian Event Classification for Intrusion Detection.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

2002
Stateful Intrusion Detection for High-Speed Networks.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

Composable Tools For Network Discovery and Security Analysis.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002


  Loading...