Michael Meier

Affiliations:
  • University of Bonn, Institute of Computer Science
  • Dortmund University of Technology, Department of Computer Science
  • Brandenburg University of Technology, Computer Science Department


According to our database1, Michael Meier authored at least 56 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Analyzing the Feasibility of Privacy-Respecting Automated Tracking of Devices Fleeing a Burglary.
Proceedings of the 19th International Conference on Wireless and Mobile Computing, 2023

On the Feasibility of Detecting Non-Cooperative Wi-Fi Devices via a Single Wi-Fi-Router.
Proceedings of the WiP Proceedings of the Thirteenth International Conference on Indoor Positioning and Indoor Navigation - Work-in-Progress Papers (IPIN-WiP 2023) co-located with 13th International Conference on Indoor Positioning and Indoor Navigation (IPIN 2023), Nuremberg, Germany, September 25, 2023

2022
On the Feasibility of Supervised Machine Learning for the Detection of Malicious Software Packages.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Automated identification of vulnerable devices in networks using traffic data and deep learning.
Int. J. Inf. Priv. Secur. Integr., 2021

2020
If You've Seen One, You've Seen Them All: Leveraging AST Clustering Using MCL to Mimic Expertise to Detect Software Supply Chain Attacks.
CoRR, 2020

Utility Requirement Description for Utility-Preserving and Privacy-Respecting Data Pseudonymization.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020

Tracing Privilege Misuse Through Behavioral Anomaly Detection in Geometric Spaces.
Proceedings of the 13th International Conference on Systematic Approaches to Digital Forensic Engineering, 2020

Track Down Identity Leaks using Threat Intelligence.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Credential Intelligence Agency: A Threat Intelligence Approach to Mitigate Identity Theft.
Proceedings of the Information Systems Security and Privacy - 6th International Conference, 2020

Privacy-Preserving Warning Management for an Identity Leakage Warning Network.
Proceedings of the EICC 2020: European Interdisciplinary Cybersecurity Conference, 2020

Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020

An investigation on the feasibility of the bluetooth frequency hopping mechanism for the use as a covert channel technique.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

Generalizing the phishing principle: analyzing user behavior in response to controlled stimuli for IT security awareness assessment.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

Towards detection of software supply chain attacks by forensic artifacts.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Automated Pattern Inference Based on Repeatedly Observed Malware Artifacts.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Warning of Affected Users About an Identity Leak.
Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition, 2018

Ein Werkzeug zur automatisierten Analyse von Identitätsdaten-Leaks.
Proceedings of the Sicherheit 2018, 2018

Gathering and analyzing identity leaks for a proactive warning of affected users.
Proceedings of the 15th ACM International Conference on Computing Frontiers, 2018

Hunting Observable Objects for Indication of Compromise.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Detecting zero-day attacks using context-aware anomaly detection at the application-layer.
Int. J. Inf. Sec., 2017

Reclaim Your Prefix: Mitigation of Prefix Hijacking Using IPsec Tunnels.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

Towards a Toolkit for Utility and Privacy-Preserving Transformation of Semi-structured Data Using Data Pseudonymization.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

2016
Covert channel-internal control protocols: attacks and defense.
Secur. Commun. Networks, 2016

Improved Calculation of aS Resilience against IP Prefix Hijacking.
Proceedings of the 41st IEEE Conference on Local Computer Networks Workshops, 2016

2015
Apate - A Linux Kernel Module for High Interaction Honeypots.
CoRR, 2015

Security and Privacy Policy Languages: A Survey, Categorization and Gap Identification.
CoRR, 2015

B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Securing BACnet's Pitfalls.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Countermeasures for Covert Channel-Internal Control Protocols.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Envisioning Smart Building Botnets.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Towards Suppressing Attacks on and Improving Resilience of Building Automation Systems - an Approach Exemplified Using BACnet.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Codescanner: Detecting (Hidden) x86/x64 code in arbitrary files.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014

Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats.
Proceedings of the ISSE 2014, 2014

Inter-AS routing anomalies: Improved detection and classification.
Proceedings of the 6th International Conference on Cyber Conflict, 2014

2012
Generalizing Behavioral Signatures for Detecting Unknown Malware Variants and Early Warning.
Prax. Inf.verarb. Kommun., 2012

Modeling and Describing Misuse Scenarios Using Signature-Nets and Event Description Language.
it Inf. Technol., 2012

2010
Cooperation enablement for centralistic early warning systems.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Throwing a MonkeyWrench into Web Attackers Plans.
Proceedings of the Communications and Multimedia Security, 2010

2009
Learning SQL for Database Intrusion Detection using Context-Sensitive Modelling.
Proceedings of the LWA 2009: Workshop-Woche: Lernen, 2009

Measuring similarity of malware behavior.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

Learning SQL for Database Intrusion Detection Using Context-Sensitive Modelling (Extended Abstract).
Proceedings of the Detection of Intrusions and Malware, 2009

Towards Early Warning Systems - Challenges, Technologies and Architecture.
Proceedings of the Critical Information Infrastructures Security, 2009

2008
08102 Working Group -- Early Warning Systems.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

Systematic Signature Engineering by Re-use of Snort Signatures.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Intrusion detection effektiv! - Modellierung und Analyse von Angriffsmustern.
PhD thesis, 2007

Authorization Architectures for Privacy-Respecting Surveillance.
Proceedings of the Public Key Infrastructure, 2007

Efficiency Issues of Rete-Based Expert Systems for Misuse Detection.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Vereinfachung der Signaturentwicklung durch Wiederverwendung.
Proceedings of the Sicherheit 2006: Sicherheit, 2006

Simplifying Signature Engineering by Reuse.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

2005
Effiziente Analyseverfahren für Intrusion-Detection-Systeme.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

Improving the Efficiency of Misuse Detection.
Proceedings of the Detection of Intrusions and Malware, 2005

2004
Reactive Security - Intrusion Detection, Honeypots, and Vulnerability Assessment.
Prax. Inf.verarb. Kommun., 2004

A Model for the Semantics of Attack Signatures in Misuse Detection Systems.
Proceedings of the Information Security, 7th International Conference, 2004

2003
High-Efficient Intrusion Detection Infrastructure.
Proceedings of the Security, 2003

2002
Bausteine für effiziente Intrusion-Detection-Systeme.
Prax. Inf.verarb. Kommun., 2002

SHEDEL-A Simple Hierarchical Event Description Language for Specifying Attack Signatures.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002


  Loading...