Stefan Burschka

According to our database1, Stefan Burschka authored at least 9 papers between 2004 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Tranalyzer: Versatile high performance network traffic analyser.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

2010
Analysis of information leakage from encrypted Skype conversations.
Int. J. Inf. Sec., 2010

On the Privacy of Encrypted Skype Communications.
Proceedings of the Global Communications Conference, 2010

2009
Testing Detector Parameterization Using Evolutionary Exploit Generation.
Proceedings of the Applications of Evolutionary Computing, 2009

Traffic to protocol reverse engineering.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009

Optimizing anomaly detector deployment under evolutionary black-box vulnerability testing.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009

Generating mimicry attacks using genetic programming: A benchmarking study.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

2004
Alarm Reduction and Correlation in Defence of IP Networks.
Proceedings of the 13th IEEE International Workshops on Enabling Technologies (WETICE 2004), 2004

Alarm Reduction and Correlation in Intrusion Detection Systems.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2004


  Loading...