Ulrich Flegel

Affiliations:
  • Technical University of Dortmund, Germany


According to our database1, Ulrich Flegel authored at least 39 papers between 1998 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Tracing Privilege Misuse Through Behavioral Anomaly Detection in Geometric Spaces.
Proceedings of the 13th International Conference on Systematic Approaches to Digital Forensic Engineering, 2020

2017
Detecting zero-day attacks using context-aware anomaly detection at the application-layer.
Int. J. Inf. Sec., 2017

2012
Modeling and Describing Misuse Scenarios Using Signature-Nets and Event Description Language.
it Inf. Technol., 2012

Reactive Security.
it Inf. Technol., 2012

Monitoring Security and Safety of Assets in Supply Chains.
Proceedings of the Future Security - 7th Security Research Conference, 2012

2011
Detecting Collusive Fraud in Enterprise Resource Planning Systems.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

2010
A State of the Art Survey of Fraud Detection Technology.
Proceedings of the Insider Threats in Cyber Security, 2010

Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection.
Proceedings of the Insider Threats in Cyber Security, 2010

Fraud Detection in ERP Systems Using Scenario Matching.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Cooperation enablement for centralistic early warning systems.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Privacy Compliant Internal Fraud Screening.
Proceedings of the ISSE 2010, 2010

2009
Editorial.
J. Comput. Virol., 2009

Technischer Datenschutz für IDS und FDS durch Pseudonymisierung.
Datenschutz und Datensicherheit, 2009

Towards Early Warning Systems - Challenges, Technologies and Architecture.
Proceedings of the Critical Information Infrastructures Security, 2009

Towards Validating Security Protocol Deployment in the Wild.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
A Secure Task Delegation Model for Workflows.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Supporting Evidence-Based Compliance Evaluation for Partial Business Process Outsourcing Scenarios.
Proceedings of the First International Workshop on Requirements Engineering and Law, 2008

Fraud Detection from a Business Perspective: Future Directions and Challenges.
Proceedings of the Countering Insider Threats, 20.07. - 25.07.2008, 2008

Collaborative Fraud Detection in Outsourcing Scenarios: Issues of and Solutions for Privacy and Confidentiality.
Proceedings of the Countering Insider Threats, 20.07. - 25.07.2008, 2008

08102 Working Group -- Intrusion and Fraud Detection for Web Services.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

Systematic Signature Engineering by Re-use of Snort Signatures.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Authorization Architectures for Privacy-Respecting Surveillance.
Proceedings of the Public Key Infrastructure, 2007

Efficiency Issues of Rete-Based Expert Systems for Misuse Detection.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

Privacy-Respecting Intrusion Detection
Advances in Information Security 35, Springer, ISBN: 978-0-387-34346-4, 2007

2006
Vereinfachung der Signaturentwicklung durch Wiederverwendung.
Proceedings of the Sicherheit 2006: Sicherheit, 2006

Simplifying Signature Engineering by Reuse.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

Requirements of Information Reductions for Cooperating Intrusion Detection Agents.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

2005
Pseudonymizing audit data for privacy respecting misuse detection.
PhD thesis, 2005

Evaluating the Design of an Audit Data Pseudonymizer Using Basic Building Blocks for Anonymity.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

2004
Reactive Security - Intrusion Detection, Honeypots, and Vulnerability Assessment.
Prax. Inf.verarb. Kommun., 2004

2003
Secure Mediation: Requirements, Design, and Architecture.
J. Comput. Secur., 2003

Anonyme Audit-Daten im Überblick - Architekturen für anonyme Autorisierungen und Audit-Daten.
Datenschutz und Datensicherheit, 2003

Ein Architektur-Modell für anonyme Autorisierungen und Überwachungsdaten.
Proceedings of the 33. Jahrestagung der Gesellschaft für Informatik, Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit", INFORMATIK 2003 - Mit Sicherheit Informatik, Frankfurt am Main, Germany, September 29, 2003

2002
Pseudonymizing Unix Log Files.
Proceedings of the Infrastructure Security, International Conference, 2002

Ausgleich von Datenschutz und Überwachung mit technischer Zweckbindung am Beispiel eines Pseudonymisierers.
Proceedings of the 32. Jahrestagung der Gesellschaft für Informatik, Informatik bewegt, INFORMATIK 2002, Dortmund, Germany, September 30, 2002

2000
Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection.
Proceedings of the Recent Advances in Intrusion Detection, Third International Workshop, 2000

On Pseudonymization of Audit Data for Intrusion Detection.
Proceedings of the Designing Privacy Enhancing Technologies, 2000

Threshold-based identity recovery for privacy enhanced applications.
Proceedings of the CCS 2000, 2000

1998
Secure Mediation: Requirements and Design.
Proceedings of the Database Security XII: Status and Prospects, 1998


  Loading...