Sven Dietrich

According to our database1, Sven Dietrich authored at least 18 papers between 2000 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Fingerprinting Cryptographic Protocols with Key Exchange Using an Entropy Measure.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

2017
Detecting zero-day attacks using context-aware anomaly detection at the application-layer.
Int. J. Inf. Sec., 2017

Security Challenges and Opportunities of Software-Defined Networking.
IEEE Security & Privacy, 2017

Fingerprinting Cryptographic Protocols with Key Exchange using an Entropy Measure.
CoRR, 2017

Cybersecurity and the Future.
IEEE Computer, 2017

2016
Network Attack Detection and Defense (Dagstuhl Seminar 16361).
Dagstuhl Reports, 2016

Who Are You Now? Fading to Multiple Personas.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

2014
Ethics in Data Sharing: Developing a Model for Best Practice.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

2013
A Secure Submission System for Online Whistleblowing Platforms
CoRR, 2013

A Secure Submission System for Online Whistleblowing Platforms.
Proceedings of the Financial Cryptography and Data Security, 2013

2012
Experiments with P2P Botnet Detection.
it - Information Technology, 2012

2011
Building an Active Computer Security Ethics Community.
IEEE Security & Privacy, 2011

SkyNET: A 3G-Enabled Mobile Attack Drone and Stealth Botmaster.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011

2010
WECSR Preface.
Proceedings of the Financial Cryptography and Data Security, 2010

Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2008
P2P as botnet command and control: A deeper insight.
Proceedings of the 3rd International Conference on Malicious and Unwanted Software, 2008

2007
Secure Software Architecture, Design, Implementation and Assurance.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

2000
Analyzing Distributed Denial of Service Tools: The Shaft Case.
LISA, 2000


  Loading...