Learning and classification of malware behavior K Rieck, T Holz, C Willems, P Düssel, P Laskov International Conference on Detection of Intrusions and Malware, and …, 2008 | 937 | 2008 |
Learning intrusion detection: supervised or unsupervised? P Laskov, P Düssel, C Schäfer, K Rieck Image Analysis and Processing–ICIAP 2005: 13th International Conference …, 2005 | 398 | 2005 |
Method and apparatus for automatic comparison of data sequences using local and global relationships K Rieck, P Laskov, K Mueller, P Duessel US Patent 8,271,403, 2012 | 99 | 2012 |
Cyber-critical infrastructure protection using real-time payload-based anomaly detection P Düssel, C Gehl, P Laskov, JU Bußer, C Störmann, J Kästner International Workshop on Critical Information Infrastructures Security, 85-97, 2009 | 95 | 2009 |
Detecting zero-day attacks using context-aware anomaly detection at the application-layer P Duessel, C Gehl, U Flegel, S Dietrich, M Meier International Journal of Information Security, 1-16, 2016 | 81 | 2016 |
Automatic feature selection for anomaly detection M Kloft, U Brefeld, P Düessel, C Gehl, P Laskov Proceedings of the 1st ACM workshop on Workshop on AISec, 71-76, 2008 | 76 | 2008 |
Incorporation of application layer protocol syntax into anomaly detection P Düssel, C Gehl, P Laskov, K Rieck Information Systems Security: 4th International Conference, ICISS 2008 …, 2008 | 43 | 2008 |
ETHICAL ISSUES OF USER BEHAVIORAL ANALYSIS THROUGH MACHINE LEARNING. G Thomas, P Duessel, M Meier Journal of Information System Security 13 (1), 2017 | 14 | 2017 |
Detection of intrusions and malware, and vulnerability assessment L Cavallaro, D Gruss, G Pellegrino, G Giacinto Springer, 2008 | 12 | 2008 |
Tracing Privilege Misuse Through Behavioral Anomaly Detection in Geometric Spaces P Duessel, S Luo, U Flegel, S Dietrich, M Meier 2020 13th International Conference on Systematic Approaches to Digital …, 2020 | 6 | 2020 |
Ad-Hoc Queries over Document Collections–A Case Study A Löser, S Lutter, P Düssel, V Markl International Workshop on Business Intelligence for the Real-Time Enterprise …, 2009 | 6 | 2009 |
Detection of Unknown Cyber Attacks Using Convolution Kernels Over Attributed Language Models P Duessel Universitäts-und Landesbibliothek Bonn, 2018 | 4 | 2018 |
Learning and Classification of Malware Behavior P Düssel, T Holz, P Laskov, K Rieck, C Willems DIMVA 2008, July 10-11, 2008, Paris, France, 2009 | | 2009 |
Panel/tutorial Co0Chairs P Duessel, U Flegel, K Lynn, S Dietrich, D Frincke, Y Guan, M Huang, ... | | |
Ad-hoc Queries over Document Collections-a Case Study (incomplete workshop discussion draft) A Löser, S Lutter, P Düssel, V Markl | | |