Folgen
Jessica Steinberger
Jessica Steinberger
University of Applied Sciences Mannheim
Bestätigte E-Mail-Adresse bei hs-mannheim.de - Startseite
Titel
Zitiert von
Zitiert von
Jahr
How to exchange security events? overview and evaluation of formats and protocols
J Steinberger, A Sperotto, M Golling, H Baier
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015
702015
DDoS defense using MTD and SDN
J Steinberger, B Kuhnert, C Dietz, L Ball, A Sperotto, H Baier, A Pras, ...
NOMS 2018-2018 IEEE/IFIP network operations and management symposium, 1-9, 2018
522018
IoT-botnet detection and isolation by access routers
C Dietz, RL Castro, J Steinberger, C Wilczak, M Antzek, A Sperotto, ...
2018 9th International Conference on the Network of the Future (NOF), 88-95, 2018
462018
Towards automated incident handling: How to select an appropriate response against a network-based attack?
S Ossenbühl, J Steinberger, H Baier
2015 Ninth International Conference on IT Security Incident Management & IT …, 2015
432015
Anomaly Detection and mitigation at Internet scale: A survey
J Steinberger, L Schehlmann, S Abt, H Baier
Emerging Management Mechanisms for the Future Internet: 7th IFIP WG 6.6 …, 2013
362013
Collaborative DDoS defense using flow-based security event information
J Steinberger, B Kuhnert, A Sperotto, H Baier, A Pras
NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 516-522, 2016
312016
Collaborative attack mitigation and response: a survey
J Steinberger, A Sperotto, H Baier, A Pras
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015
232015
Driver identification using in-vehicle digital data in the forensic context of a hit and run accident
K Dološ, C Meyer, A Attenberger, J Steinberger
Forensic Science International: Digital Investigation 35, 301090, 2020
192020
DDoS 3.0-How terrorists bring down the Internet
A Pras, JJ Santanna, J Steinberger, A Sperotto
Measurement, Modelling and Evaluation of Dependable Computer and …, 2016
192016
Distributed DDoS Defense - A collaborative Approach at Internet Scale
J Steinberger
University of Twente, 2018
112018
In whom do we trust-sharing security events
J Steinberger, B Kuhnert, A Sperotto, H Baier, A Pras
Management and Security in the Age of Hyperconnectivity: 10th IFIP WG 6.6 …, 2016
92016
Exchanging security events of flow-based intrusion detection systems at internet scale
J Steinberger, A Sperotto, H Baier, A Pras
Internet Architecture Board and Internet Society Coordinating Attack …, 2015
72015
Botnet detection and prevention in anonymous networks
K Kuhnert, J Steinberger, H Baier
12th International Conference on Autonomous Infrastructure, Management and …, 2018
32018
“LUDO”–KIDS PLAYING DISTRIBUTED DENIAL OF SERVICE
J Steinberger, JJ Santanna, E Spatharas, H Amler, N Breuer, K Graul, ...
TERENA Networking Conference (TNC), 2016
22016
Forensic driver identification considering an unknown suspect
K Dološ, C Meyer, A Attenberger, J Steinberger
International Journal of Applied Mathematics and Computer Science 31 (4 …, 2021
12021
Booters and Certificates: An Overview of TLS in the DDoS-as-a-Service Landscape
B Kuhnert, J Steinberger, H Baier, A Sperotto, A Pras
2nd International Conference on Advances in Computation, Communications and …, 2017
12017
Real-time DDoS defense: a collaborative approach at internet scale
J Steinberger, A Sperotto, A Pras, H Baier
10. GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit, 9, 2015
12015
Botnet Detection in Anonymous Networks.
K Kuhnert, J Steinberger, H Baier
AIMS, 11-15, 2018
2018
SPRING 2016: Proceedings of the 11th SPRING graduate workshop of the special interest group Security–Intrusion Detection and Response (SIDAR) of the German informatics Society (GI)
J Steinberger
German Informatics Society (GI), 2016
2016
Whom do we trust-Booters and SSL/TLS certificates
J Steinberger, B Kuhnert, S Alavi, JJC de Santanna, A Sperotto, H Baier, ...
11th SPRING graduate workshop of the special interest group Security …, 2016
2016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20