Michael Vogel

According to our database1, Michael Vogel authored at least 17 papers between 2000 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Data Volume Reduction for Deep Packet Inspection by Multi-layer Application Determination.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

2020
Essential Workers: A Multiplayer Game for Enacting Patterns of Social Interdependency in a Pandemic.
Proceedings of the CHI PLAY '20: The Annual Symposium on Computer-Human Interaction in Play, Virtual Event, Canada, November 2-4, 2020, 2020

2019
An SDN-based Approach to Protect Communication Between Virtual Machines.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019

2014
Parallelization of Network Intrusion Detection Systems under Attack Conditions.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

2012
Automated Generation of Precise Signatures.
Prax. Inf.verarb. Kommun., 2012

2011
Using model checking to identify errors in intrusion detection signatures.
Int. J. Softw. Tools Technol. Transf., 2011

Modeling a distributed intrusion detection system using collaborative building blocks.
ACM SIGSOFT Softw. Eng. Notes, 2011

Efficient Distributed Intrusion Detection applying Multi Step Signatures.
Proceedings of the 17th GI/ITG Conference on Communication in Distributed Systems, 2011

Efficient Distributed Signature Analysis.
Proceedings of the Managing the Dynamics of Networks and Services, 2011

2010
Iterative präzisionsbewertende Signaturgenerierung.
Proceedings of the Sicherheit 2010: Sicherheit, 2010

Explorative Visualization of Log Data to Support Forensic Analysis and Signature Development.
Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010

2009
Analyseverlagerung in IDS-Overlaynetzen.
Prax. Inf.verarb. Kommun., 2009

Identifying Modeling Errors in Signatures by Model Checking.
Proceedings of the Model Checking Software, 2009

2008
Automatic Generation of Cycle Accurate SystemC Models for Application Specific Clustered VLIW Processors.
Proceedings of the Methoden und Beschreibungssprachen zur Modellierung und Verifikation von Schaltungen und Systemen (MBMV), 2008

08102 Working Group -- Early Warning Systems.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

2001
Protection Profiles and Generic Security Targets for Smart Cards as Secure Signature Creation Devices - Existing Solutions for the Payment Sector.
Proceedings of the Smart Card Programming and Security, 2001

2000
Detection and Classification of Sleep-Disordered Breathing Using Acoustic Respiratory Input Impedance and Nasal Pressure.
Proceedings of the Medical Data Analysis, First International Symposium, 2000


  Loading...