Seguir
Mathias Fischer
Mathias Fischer
Universität Hamburg
Dirección de correo verificada de ieee.org - Página principal
Título
Citado por
Citado por
Año
Taxonomy and survey of collaborative intrusion detection
E Vasilomanolakis, S Karuppayah, M Mühlhäuser, M Fischer
ACM Computing Surveys (CSUR) 47 (4), 1-33, 2015
4082015
Analyzing flow-based anomaly intrusion detection using replicator neural networks
CG Cordero, S Hauke, M Mühlhäuser, M Fischer
2016 14th Annual Conference on Privacy, Security and Trust (PST), 317-324, 2016
742016
GAC: graph-based alert correlation for the detection of distributed multi-step attacks
S Haas, M Fischer
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 979-988, 2018
522018
A distributed IP mobility approach for 3G SAE
M Fischer, FU Andersen, A Koepsel, G Schaefer, M Schlaeger
Personal, Indoor and Mobile Radio Communications, 2008. PIMRC 2008. IEEE …, 2008
482008
Tracking Users across the Web via TLS Session Resumption
E Sy, C Burkert, H Federrath, M Fischer
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
452018
On the Security of IEEE 802.1 Time-Sensitive Networking
D Ergenç, C Brülhart, J Neumann, L Krüger, M Fischer
2021 IEEE International Conference on Communications Workshops (ICC …, 2021
382021
On the Reliability of IEEE 802.1 CB FRER
D Ergenç, M Fischer
IEEE INFOCOM 2021-IEEE Conference on Computer Communications, 1-10, 2021
372021
On Advanced Monitoring in Resilient and Unstructured P2P Botnets
S Karuppayah, M Fischer, C Rossow, M Mühlhäuser
International Conference on Communications (ICC) - Communications and …, 2014
362014
On the alert correlation process for the detection of multi-step attacks and a graph-based realization
S Haas, M Fischer
ACM SIGAPP Applied Computing Review 19 (1), 5-19, 2019
352019
SkipMon: A Locality-Aware Collaborative Intrusion Detection System
E Vasilomanolakis, M Kr, CG Cordero, M Max, M Fischer
2015 IEEE 34th International Performance Computing and Communications …, 2015
342015
Zeek-osquery: Host-network correlation for advanced monitoring and intrusion detection
S Haas, R Sommer, M Fischer
ICT Systems Security and Privacy Protection: 35th IFIP TC 11 International …, 2020
332020
Multi-Stage Attack Detection via Kill Chain State Machines
F Wilkens, F Ortmann, S Haas, M Vallentin, M Fischer
Proceedings of the 3rd Workshop on Cyber-Security Arms Race, 13-24, 2021
312021
A memory-deduplication side-channel attack to detect applications in co-resident virtual machines
J Lindemann, M Fischer
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 183-192, 2018
312018
SDN-based Self-Configuration for Time-Sensitive IoT Networks
NS Bülbül, D Ergenç, M Fischer
2021 IEEE 46th Conference on Local Computer Networks (LCN), 73-80, 2021
292021
AnonPubSub: Anonymous publish-subscribe overlays
J Daubert, M Fischer, T Grube, S Schiffner, P Kikiras, M Mühlhäuser
Computer Communications 76, 42-53, 2016
292016
Hostage: a mobile honeypot for collaborative defense
E Vasilomanolakis, S Karuppayah, M Mühlhäuser, M Fischer
Proceedings of the 7th International Conference on Security of Information …, 2014
292014
On the resilience of P2P-based botnet graphs
S Haas, S Karuppayah, S Manickam, M Mühlhäuser, M Fischer
2016 IEEE Conference on Communications and Network Security (CNS), 225-233, 2016
272016
SDN/NFV-based DDoS Mitigation via Pushback
NS Bülbül, M Fischer
ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-6, 2020
252020
A QUIC Look at Web Tracking
E Sy, C Burkert, H Federrath, M Fischer
Proceedings on Privacy Enhancing Technologies 2019 (3), 255-266, 2019
252019
This network is infected: HosTaGe-a low-interaction honeypot for mobile devices
E Vasilomanolakis, S Karuppayah, M Fischer, M Mühlhäuser, ...
Proceedings of the Third ACM workshop on Security and privacy in smartphones …, 2013
252013
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20