Learning and classification of malware behavior K Rieck, T Holz, C Willems, P Düssel, P Laskov International Conference on Detection of Intrusions and Malware, and …, 2008 | 894 | 2008 |
Learning intrusion detection: supervised or unsupervised? P Laskov, P Düssel, C Schäfer, K Rieck Image Analysis and Processing–ICIAP 2005: 13th International Conference …, 2005 | 373 | 2005 |
Method and apparatus for automatic comparison of data sequences using local and global relationships K Rieck, P Laskov, K Mueller, P Duessel US Patent 8,271,403, 2012 | 93 | 2012 |
Cyber-critical infrastructure protection using real-time payload-based anomaly detection P Düssel, C Gehl, P Laskov, JU Bußer, C Störmann, J Kästner International Workshop on Critical Information Infrastructures Security, 85-97, 2009 | 93 | 2009 |
Detecting zero-day attacks using context-aware anomaly detection at the application-layer P Duessel, C Gehl, U Flegel, S Dietrich, M Meier International Journal of Information Security, 1-16, 2016 | 76 | 2016 |
Automatic feature selection for anomaly detection M Kloft, U Brefeld, P Düessel, C Gehl, P Laskov Proceedings of the 1st ACM workshop on Workshop on AISec, 71-76, 2008 | 73 | 2008 |
Incorporation of application layer protocol syntax into anomaly detection P Düssel, C Gehl, P Laskov, K Rieck Information Systems Security: 4th International Conference, ICISS 2008 …, 2008 | 44 | 2008 |
ETHICAL ISSUES OF USER BEHAVIORAL ANALYSIS THROUGH MACHINE LEARNING. G Thomas, P Duessel, M Meier Journal of Information System Security 13 (1), 2017 | 15 | 2017 |
Detection of intrusions and malware, and vulnerability assessment L Cavallaro, P Saxena, R Sekar, ... Springer, 2008 | 11 | 2008 |
Ad-Hoc Queries over Document Collections–A Case Study A Löser, S Lutter, P Düssel, V Markl Enabling Real-Time Business Intelligence: Third International Workshop …, 2010 | 6 | 2010 |
Tracing Privilege Misuse Through Behavioral Anomaly Detection in Geometric Spaces P Duessel, S Luo, U Flegel, S Dietrich, M Meier 2020 13th International Conference on Systematic Approaches to Digital …, 2020 | 4 | 2020 |
Detection of Unknown Cyber Attacks Using Convolution Kernels Over Attributed Language Models P Duessel Universitäts-und Landesbibliothek Bonn, 2018 | 4 | 2018 |
Learning and Classification of Malware Behavior P Düssel, T Holz, P Laskov, K Rieck, C Willems DIMVA 2008, July 10-11, 2008, Paris, France, 2009 | | 2009 |
Panel/tutorial Co0Chairs P Duessel, U Flegel, K Lynn, S Dietrich, D Frincke, Y Guan, M Huang, ... | | |
Ad-hoc Queries over Document Collections-a Case Study (incomplete workshop discussion draft) A Löser, S Lutter, P Düssel, V Markl | | |