Martin Ussath

According to our database1, Martin Ussath authored at least 11 papers between 2013 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Analytical approaches for advanced attacks.
PhD thesis, 2017

Enhanced Sinkhole System: Collecting System Details to Support Investigations.
Proceedings of the Mobile, Secure, and Programmable Networking, 2017

Identifying Suspicious User Behavior with Neural Networks.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

2016
Automatic multi-step signature derivation from taint graphs.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

Insights into Encrypted Network Connections: Analyzing Remote Desktop Protocol Traffic.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016

Event attribute tainting: A new approach for attack tracing and event correlation.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Advanced persistent threats: Behind the scenes.
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016

2015
Concept for a security investigation framework.
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015

Parallel and distributed normalization of security events for instant attack analysis.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Multi-step Attack Pattern Detection on Normalized Event Logs.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2013
Slicing droids: program slicing for smali code.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013


  Loading...