Jacob Zimmermann

According to our database1, Jacob Zimmermann authored at least 11 papers between 2002 and 2011.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Static deep error checking in large system applications using parfait.
Proceedings of the SIGSOFT/FSE'11 19th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-19) and ESEC'11: 13th European Software Engineering Conference (ESEC-13), 2011

2010
Experimenting with an Intrusion Detection System for Encrypted Networks.
Int. J. Bus. Intell. Data Min., 2010

Automatic Generation of Assertions to Detect Potential Security Vulnerabilities in C Programs That Use Union and Pointer Types.
Proceedings of the Fourth International Conference on Network and System Security, 2010

2009
Towards Intrusion Detection for Encrypted Networks.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Characterization of Attackers? Activities in Honeypot Traffic Using Principal Component Analysis.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

2006
Distributed intrusion detection in clusters based on non-interference.
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006

2005
The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet Traffic.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005

A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2003
An Improved Reference Flow Control Model for Policy-Based Intrusion Detection.
Proceedings of the Computer Security, 2003

Experimenting with a Policy-Based HIDS Based on an Information Flow Control Model.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

2002
Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Level.
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002


  Loading...