Sebastian Schmerl

According to our database1, Sebastian Schmerl authored at least 22 papers between 2005 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Cyber-Defense "Gemessen, Bewertet und Ausgerichtet" - Ein Praxisbericht.
Proceedings of the Sicherheit, 2022

2012
Automated Generation of Precise Signatures.
Prax. Inf.verarb. Kommun., 2012

2011
Ansätze zur systematischen Ableitung von Signaturen: Methoden im Entwicklungsprozess einer Signatur.
PhD thesis, 2011

Using model checking to identify errors in intrusion detection signatures.
Int. J. Softw. Tools Technol. Transf., 2011

Modeling a distributed intrusion detection system using collaborative building blocks.
ACM SIGSOFT Softw. Eng. Notes, 2011

Efficient Distributed Intrusion Detection applying Multi Step Signatures.
Proceedings of the 17th GI/ITG Conference on Communication in Distributed Systems, 2011

Efficient Distributed Signature Analysis.
Proceedings of the Managing the Dynamics of Networks and Services, 2011

2010
Iterative präzisionsbewertende Signaturgenerierung.
Proceedings of the Sicherheit 2010: Sicherheit, 2010

Explorative Visualization of Log Data to Support Forensic Analysis and Signature Development.
Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010

Model-Driven Protocol Design Based on Component Oriented Modeling.
Proceedings of the Formal Methods and Software Engineering, 2010

2009
Analyseverlagerung in IDS-Overlaynetzen.
Prax. Inf.verarb. Kommun., 2009

Identifying Modeling Errors in Signatures by Model Checking.
Proceedings of the Model Checking Software, 2009

2008
Systematische Ableitung von Signaturen durch Wiederverwendung am Beispiel von Snort.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

08102 Working Group -- Early Warning Systems.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

Systematic Signature Engineering by Re-use of Snort Signatures.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Towards Systematic Signature Testing.
Proceedings of the Testing of Software and Communicating Systems, 2007

Efficiency Issues of Rete-Based Expert Systems for Misuse Detection.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Vereinfachung der Signaturentwicklung durch Wiederverwendung.
Proceedings of the Sicherheit 2006: Sicherheit, 2006

Simplifying Signature Engineering by Reuse.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

2005
Effiziente Analyseverfahren für Intrusion-Detection-Systeme.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

Ein Ansatz zur Virtualisierung der Analyse von Audit-Daten.
Proceedings of the 35. Jahrestagung der Gesellschaft für Informatik, 2005

Improving the Efficiency of Misuse Detection.
Proceedings of the Detection of Intrusions and Malware, 2005


  Loading...