Christian Seifert
Orcid: 0000-0001-9182-8687
According to our database1,
Christian Seifert
authored at least 33 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
PyRIT: A Framework for Security Risk Identification and Red Teaming in Generative AI System.
CoRR, 2024
CoRR, 2024
2023
Proceedings of the 26th Euromicro Conference on Digital System Design, 2023
2022
Trust your BMS: Designing a Lightweight Authentication Architecture for Industrial Networks.
Proceedings of the IEEE International Conference on Industrial Technology, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
2021
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
2020
Sufficient Criteria and Sharp Geometric Conditions for Observability in Banach Spaces.
SIAM J. Control. Optim., 2020
Proceedings of the 46th Annual Conference of the IEEE Industrial Electronics Society, 2020
2019
Proceedings of the 2019 IEEE Military Communications Conference, 2019
Detecting Cyber Attacks Using Anomaly Detection with Explanations and Expert Feedback.
Proceedings of the IEEE International Conference on Acoustics, 2019
2016
Proceedings of the 2016 IEEE Military Communications Conference, 2016
2015
Dynamic Allostery of the Catabolite Activator Protein Revealed by Interatomic Forces.
PLoS Comput. Biol., 2015
2014
An Allosteric Signaling Pathway of Human 3-Phosphoglycerate Kinase from Force Distribution Analysis.
PLoS Comput. Biol., 2014
2013
Proceedings of the IEEE International Conference on Acoustics, 2013
2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
2011
BMC Bioinform., 2011
Proceedings of the 20th International Conference on World Wide Web, 2011
Proceedings of the 20th USENIX Security Symposium, 2011
2010
Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010
Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010
2009
True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots.
Proceedings of the Third International Conference on Emerging Security Information, 2009
Proceedings of the Foundations of Augmented Cognition. Neuroergonomics and Operational Neuroscience, 2009
Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, 2009
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
2008
Single-trial coupling of EEG and fMRI reveals the involvement of early anterior cingulate cortex activation in effortful decision making.
NeuroImage, 2008
Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
Identification of malicious web pages through analysis of underlying DNS and web server relationships.
Proceedings of the LCN 2008, 2008
Proceedings of the Advances in Digital Forensics IV, 2008
2007
Digit. Investig., 2007
Proceedings of the Global Communications Conference, 2007