Rick Hofstede

According to our database1, Rick Hofstede authored at least 25 papers between 2009 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Flow-Based Compromise Detection: Lessons Learned.
IEEE Secur. Priv., 2018

2017
Flow-Based Web Application Brute-Force Attack and Compromise Detection.
J. Netw. Syst. Manag., 2017

DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Flow-based compromise detection.
PhD thesis, 2016

2015
Measuring Cloud Service Health Using NetFlow/IPFIX: The WikiLeaks Case.
J. Netw. Syst. Manag., 2015

Special issue on measure, detect and mitigate-challenges and trends in network security.
Int. J. Netw. Manag., 2015

A first look at HTTP(S) intrusion detection using NetFlow/IPFIX.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Real-time DDoS attack detection for Cisco IOS using NetFlow.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Booters - An analysis of DDoS-as-a-service attacks.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Unveiling flat traffic on the Internet: An SSH attack case study.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

2014
Flow-based Approaches in Network Management: Recent Advances and Future Trends.
Int. J. Netw. Manag., 2014

Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX.
IEEE Commun. Surv. Tutorials, 2014

SSH Compromise Detection using NetFlow/IPFIX.
Comput. Commun. Rev., 2014

Towards multi-layered intrusion detection in high-speed networks.
Proceedings of the 6th International Conference on Cyber Conflict, 2014

YANG2UML: Bijective transformation and simplification of YANG to UML.
Proceedings of the 10th International Conference on Network and Service Management, 2014

2013
Networking for the Cloud: Challenges and Trends.
Prax. Inf.verarb. Kommun., 2013

Measurement Artifacts in NetFlow Data.
Proceedings of the Passive and Active Measurement - 14th International Conference, 2013

Large-scale geolocation for NetFlow.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Towards real-time intrusion detection for NetFlow and IPFIX.
Proceedings of the 9th International Conference on Network and Service Management, 2013

2012
Real-Time and Resilient Intrusion Detection: A Flow-Based Approach.
Proceedings of the Dependable Networks and Services, 2012

SSHCure: A Flow-Based SSH Intrusion Detection System.
Proceedings of the Dependable Networks and Services, 2012

2011
Flow Monitoring Experiences at the Ethernet-Layer.
Proceedings of the Energy-Aware Communications - 17th International Workshop, 2011

Carrier Ethernet OAM: An Overview and Comparison to IP OAM.
Proceedings of the Managing the Dynamics of Networks and Services, 2011

2010
The Network Data Handling War: MySQL vs. NfDump.
Proceedings of the Networked Services and Applications, 2010

2009
SURFmap: A network monitoring tool based on the Google Maps API.
Proceedings of the Integrated Network Management, 2009


  Loading...