Sven Krasser

According to our database1, Sven Krasser authored at least 18 papers between 2003 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Valkyrie: Behavioral malware detection using global kernel-level telemetry data.
Proceedings of the 25th IEEE International Workshop on Machine Learning for Signal Processing, 2015

2010
Mining DNS for malicious domain registrations.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

2009
SVMs Modeling for Highly Imbalanced Classification.
IEEE Trans. Syst. Man Cybern. Part B, 2009

Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine.
Proceedings of the 18th USENIX Security Symposium, 2009

2008
Highly Scalable SVM Modeling with Random Granulation for Spam Sender Detection.
Proceedings of the Seventh International Conference on Machine Learning and Applications, 2008

Support Vector Machines and Random Forests Modeling for Spam Senders Behavior Analysis.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Spam Sender Detection with Classification Modeling on Highly Imbalanced Mail Server Behavior Data.
Proceedings of the International Conference on Artificial Intelligence and Pattern Recognition, 2008

2007
Communication Networks Adaptive measurement-based traffic engineering in small differentiated services domains.
Eur. Trans. Telecommun., 2007

Analyzing Network and Content Characteristics of Spim Using Honeypots.
Proceedings of the 3rd Workshop on Steps to Reducing Unwanted Traffic on the Internet, 2007

Taxonomy of Email Reputation Systems.
Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), 2007

2006
Fast and Effective Spam Sender Detection with Granular SVM on Highly Imbalanced Mail Server Behavior Data.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

2005
Traffic engineering based on local states in Internet protocol-based radio access networks.
J. Commun. Networks, 2005

Securing Layer 2 in Local Area Networks.
Proceedings of the Networking, 2005

Adaptive Per-Flow Traffic Engineering Based on Probe Packet Measurements.
Proceedings of the Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 2005

2004
Towards an Approach for Automatically Repairing Compromised Network Systems.
Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), 30 August, 2004

Addressing the Weak Link Between Layer 2 and Layer 3 in the Internet Architecture.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004

2003
Distributed bandwidth reservation by probing for available bandwidth.
Proceedings of the 11th IEEE International Conference on Networks, 2003

Probing available bandwidth in radio access networks.
Proceedings of the Global Telecommunications Conference, 2003


  Loading...