According to our database1, Sven Dietrich authored at least 22 papers between 2000 and 2018.
Legend:Book In proceedings Article PhD thesis Other
Fingerprinting Cryptographic Protocols with Key Exchange Using an Entropy Measure.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
Detecting zero-day attacks using context-aware anomaly detection at the application-layer.
Int. J. Inf. Sec., 2017
Security Challenges and Opportunities of Software-Defined Networking.
IEEE Secur. Priv., 2017
Fingerprinting Cryptographic Protocols with Key Exchange using an Entropy Measure.
Cybersecurity and the Future.
IEEE Computer, 2017
Network Attack Detection and Defense (Dagstuhl Seminar 16361).
Dagstuhl Reports, 2016
Who Are You Now? Fading to Multiple Personas.
Proceedings of the Who Are You?! Adventures in Authentication, 2016
Ethics in Data Sharing: Developing a Model for Best Practice.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014
A Secure Submission System for Online Whistleblowing Platforms.
Proceedings of the Financial Cryptography and Data Security, 2013
Experiments with P2P Botnet Detection.
it Inf. Technol., 2012
Building an Active Computer Security Ethics Community.
IEEE Secur. Priv., 2011
SkyNET: A 3G-Enabled Mobile Attack Drone and Stealth Botmaster.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011
Proceedings of the Financial Cryptography and Data Security, 2010
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
P2P as botnet command and control: A deeper insight.
Proceedings of the 3rd International Conference on Malicious and Unwanted Software, 2008
Analysis of the Storm and Nugache Trojans: P2P Is Here.
login Usenix Mag., 2007
Command and Control Structures in Malware: From Handler/Agent to P2P.
login Usenix Mag., 2007
Secure Software Architecture, Design, Implementation and Assurance.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
Active Network Defense: Some Concepts and Techniques.
login Usenix Mag., 2002
Survivability with a Twist.
login Usenix Mag., 2001
Scalpel, Gauze, and Decompilers.
login Usenix Mag., 2000
Analyzing Distributed Denial of Service Tools: The Shaft Case.
Proceedings of the 14th Conference on Systems Administration (LISA 2000), 2000