Folgen
Christian Dietz
Titel
Zitiert von
Zitiert von
Jahr
DDoS defense using MTD and SDN
J Steinberger, B Kuhnert, C Dietz, L Ball, A Sperotto, H Baier, A Pras, ...
NOMS 2018-2018 IEEE/IFIP network operations and management symposium, 1-9, 2018
522018
IoT-botnet detection and isolation by access routers
C Dietz, RL Castro, J Steinberger, C Wilczak, M Antzek, A Sperotto, ...
2018 9th International Conference on the Network of the Future (NOF), 88-95, 2018
452018
Passive remote source nat detection using behavior statistics derived from netflow
S Abt, C Dietz, H Baier, S Petrović
Emerging Management Mechanisms for the Future Internet: 7th IFIP WG 6.6 …, 2013
162013
Management and Security in the Age of Hyperconnectivity
R Badonnel, R Koch, A Pras, M Drašar, B Stiller
Springer International Publishing, 2016
62016
How to Achieve Early Botnet Detection at the Provider Level?
C Dietz, A Sperotto, G Dreo, A Pras
Management and Security in the Age of Hyperconnectivity: 10th IFIP WG 6.6 …, 2016
52016
Towards adversarial resilience in proactive detection of botnet domain names by using MTD
C Dietz, G Dreo, A Sperotto, A Pras
NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium, 1-5, 2020
32020
Passive Remote Detection of Network Address Translation (NAT) by using NetFlow
C Dietz
32013
Dmef: Dynamic malware evaluation framework
C Dietz, M Antzek, G Dreo, A Sperotto, A Pras
NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, 1-7, 2022
22022
Monitoring of the DNS Infrastructure for Proactive Botnet Detection
C Dietz, A Sperotto, G Dreo, A Pras
SPRING 2016, 2016
22016
Proactive Botnets Detection and Defense at Internet scale
C Dietz, G Dreo, A Sperotto, A Pras
TERENA Networking Conference (TNC16), 2016
12016
A Traffic Merging and Generation Framework for Realistic Synthesis of Network Traffic
C Gündogan, S Passarelli, P Hillmann, C Dietz, L Stiemert
Gesellschaft für Informatik eV SIDAR SPRING (Darmstadt 2016), 2016
12016
Language Agnostic Botnet Detection Based on ESOM and DNS
GD Christian Dietz, Rocco Mandrysch, Urs Anliker
Journal on Cybercrime & Digital Investigations - CybIN 2 (Botconf 2016), 2016
2016
D6. 4—Fourth Year Report on Automated Configuration and Repair
A Mayzaud, D Tuncer, A Sperotto, G Dreo, M Charalambides, R Mijumbi, ...
Communications, 2016
2016
Flow-Based Network Management: A Report from the IRTF NMRG Workshop
RO Schmidt, R Sadre, L Hendriks
Journal of network and systems management 24, 746-753, 2016
2016
A Traffic Merging and Generation Framework for Realistic Synthesis of Network Traffic
C Gündogan, S Passarelli, P Hillmann, C Dietz, L Stiemert
11th SPRING graduate workshop of the special interest group Security …, 2016
2016
What botnet characteristics can be used for distributed and collaborative network based botnet detection
C Dietz, A Sperotto, G Dreo, A Pras
Gesellschaft für Informatik e.V. SIDAR SPRING (Spring 10), Neubiberg …, 2015
2015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–16