Tobias Limmer

Orcid: 0000-0001-8904-0620

According to our database1, Tobias Limmer authored at least 13 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
'State of the Union': Evaluating Open Source Zero Trust Components.
Proceedings of the Security and Trust Management - 19th International Workshop, 2023

2021
System-specific risk rating of software vulnerabilities in industrial automation & control systems.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

2016
MACKE: compositional analysis of low-level vulnerabilities with symbolic execution.
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016

2012
On Network Monitoring for Intrusion Detection.
Prax. Inf.verarb. Kommun., 2012

2011
Efficient Network Monitoring for Attack Detection.
PhD thesis, 2011

Adaptive Load Balancing for Parallel IDS on Multi-Core Systems Using Prioritized Flows.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

2010
Botzilla: detecting the "phoning home" of malicious software.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Dialog-based payload aggregation for intrusion detection.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Seamless Dynamic Reconfiguration of Flow Meters: Requirements and Solutions.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2009

Flow-based TCP connection analysis.
Proceedings of the 28th International Performance Computing and Communications Conference, 2009

2008
08102 Working Group -- Requirements for Network Monitoring from an IDS Perspective.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

08102 Working Group -- Measurement Requirements.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

2006
Evaluation of Real-Time Aspects of Multiparty Security on Low-Power Mobile Devices.
Proceedings of the Echtzeitsysteme im Alltag, 2006


  Loading...