Publications
Found 45 results
Author Title Type [ Year] Filters: Author is Christian Kreibich [Clear All Filters]
(2011).
(2010).
(2010).
(2010).
Netalyzr: Illuminating The Edge Network.
246-259.
(2010).
(2010).
(2010).
(2010). Dispatcher: Enabling Active Botnet Infiltration Using Automatic Protocol Reverse-Engineering.
621-634.
(2009). Spamalytics: An Empirical Analysis of Spam Marketing Conversion.
52(9), 99-107.
(2009).
(2009).
(2008).
(2008).
(2008).
(2008).
The Strengths of Weaker Identities: Opportunistic Personas.
Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
(2007). Brooery: A Graphical Environment for Analysis of Security-Relevant Network Activity.
Proceedings of the USENIX Annual Technical Conference, FREENIX Track (USENIX '05 FREENIX). 109-118.
(2005). Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context.
Proceedings of Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2005). 206-221.
(2005). Policy-Controlled Event Management for Distributed Intrusion Detection.
Proceedings of the Fourth International Workshop on Distributed Event-Based Systems (DEBS) (ICDCSW'05). 4, 385-391.
(2005). Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics (HTML).
Proceedings of USENIX Security Symposium 2001.
(2001).