Sven Dietrich
Sven Dietrich
Associate Professor, CUNY John Jay College of Criminal Justice
Bestätigte E-Mail-Adresse bei jjay.cuny.edu - Startseite
TitelZitiert vonJahr
Internet denial of service: attack and defense mechanisms (Radia Perlman Computer Networking and Security)
J Mirkovic, S Dietrich, D Dittrich, P Reiher
Prentice Hall PTR, 2004
4912004
Analyzing Distributed Denial of Service Tools: The Shaft Case.
S Dietrich, N Long, D Dittrich
LISA, 329-339, 2000
1922000
Analysis of the Storm and Nugache Trojans: P2P is here
S Stover, D Dittrich, J Hernandez, S Dietrich
USENIX; login 32 (6), 18-27, 2007
1472007
P2P as botnet command and control: a deeper insight
D Dittrich, S Dietrich
2008 3rd International Conference on Malicious and Unwanted Software …, 2008
1352008
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts
B Coskun, S Dietrich, N Memon
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
952010
The mstream distributed denial of service attack tool
D Dittrich, G Weaver, S Dietrich, N Long
URL 3, 2000
72*2000
SkyNET: A 3G-Enabled Mobile Attack Drone and Stealth Botmaster.
T Reed, J Geis, S Dietrich
WOOT, 28-36, 2011
312011
An Analysis of the” shaft” distributed denial of service tool
S Dietrich, N Long, D Dittrich
Proceedings of LISA 2000, 2000
312000
Security challenges and opportunities of software-defined networking
MC Dacier, H König, R Cwalinski, F Kargl, S Dietrich
IEEE Security & Privacy 15 (2), 96-100, 2017
282017
Discovery techniques for P2P botnets
D Dittrich, S Dietrich
Stevens Institute of Technology CS Technical Report 2008 4, 1-14, 2008
282008
Towards community standards for ethical behavior in computer security research
D Dittrich, M Bailey, S Dietrich
Technical Report, 2009
252009
Re-evaluating the wisdom of crowds in assessing web security
PH Chia, SJ Knapskog
International Conference on Financial Cryptography and Data Security, 299-314, 2011
232011
Re-evaluating the wisdom of crowds in assessing web security
PH Chia, SJ Knapskog
International Conference on Financial Cryptography and Data Security, 299-314, 2011
232011
Building an active computer security ethics community
D Dittrich, M Bailey, S Dietrich
IEEE Security & Privacy 9 (4), 32-40, 2010
212010
Command and control structures in malware
D Dittrich, S Dietrich
Usenix magazine 32 (6), 2007
202007
New directions in peer-to-peer malware
D Dittrich, S Dietrich
2008 IEEE Sarnoff Symposium, 1-5, 2008
142008
A formal analysis of the secure sockets layer protocol
S Dietrich
PhDthesis, Dept. Mathematics andComputerScience, Adelphi University, April1997, 1997
141997
Detecting zero-day attacks using context-aware anomaly detection at the application-layer
P Duessel, C Gehl, U Flegel, S Dietrich, M Meier
International Journal of Information Security 16 (5), 475-490, 2017
132017
Ethics in data sharing: developing a model for best practice
S Dietrich, J Van Der Ham, A Pras, R van Rijswijk Deij, D Shou, ...
2014 IEEE Security and Privacy Workshops, 5-9, 2014
102014
Results of SEI independent research and development projects and report on emerging technologies and technology trends
J Bergey, S Dietrich, D Firesmith, E Forrester, A Jordan, R Kazman, ...
CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST, 2004
82004
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20