Claudia Eckert
Affiliations:- TU Munich, Faculty of Computer Science, Germany
- Fraunhofer Research Institution for Applied and Integrated Security (AISEC), Garching, Germany
- Technical University of Darmstadt, Department of Computer Science, Germany
- University of Bremen, Faculty of Mathematics and Computer Science, Germany
According to our database1,
Claudia Eckert
authored at least 152 papers
between 1990 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on id.loc.gov
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2021
hybrid-Flacon: Hybrid Pattern Malware Detection and Categorization with Network Traffic andProgram Code.
CoRR, 2021
CoRR, 2021
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Hybroid: Toward Android Malware Detection and Categorization with Program Code and Network Traffic.
Proceedings of the Information Security - 24th International Conference, 2021
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021
2020
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
Proceedings of the 16th IEEE International Conference on Automation Science and Engineering, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Sharing is Caring: Collaborative Analysis and Real-Time Enquiry for Security Analytics.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables.
Proceedings of the 26th European Signal Processing Conference, 2018
Proceedings of the Computer Security, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
Attack Graph-Based Assessment of Exploitability Risks in Automotive On-Board Networks.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Proceedings of the Handbuch Industrie 4.0 Bd.4, Allgemeine Grundlagen., 2017
Inform. Spektrum, 2017
Herausforderungen an der Schnittstelle von Informatik und Gesellschaft - Institutionalisierte Erforschung der Digitalisierung zur Sicherung von Wohlstand und Fortschritt.
Inform. Spektrum, 2017
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017
Herausforderungen an der Schnittstelle von Informatik und Gesellschaft: Institutionalisierte Erforschung der Digitalisierung zur Sicherung von Wohlstand und Fortschritt.
Proceedings of the 50 Jahre Universitäts-Informatik in München, 2017
Proceedings of the 50 Jahre Universitäts-Informatik in München, 2017
2016
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016
SKALD: A Scalable Architecture for Feature Extraction, Multi-user Analysis, and Real-Time Information Sharing.
Proceedings of the Information Security - 19th International Conference, 2016
Proceedings of the Information Security - 19th International Conference, 2016
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
DeepFuzz: Triggering Vulnerabilities Deeply Hidden in Binaries - (Extended Abstract).
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
Proceedings of the AI 2016: Advances in Artificial Intelligence, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Comput. Secur., 2015
Proceedings of the SECRYPT 2015, 2015
Automated Generation of Buffer Overflow Quick Fixes Using Symbolic Execution and SMT.
Proceedings of the Computer Safety, Reliability, and Security, 2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Automated Detection of Information Flow Vulnerabilities in UML State Charts and C Code.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015
Proceedings of the 2015 Information Security for South Africa, 2015
User Identity Verification Based on Touchscreen Interaction Analysis in Web Contexts.
Proceedings of the Information Security Practice and Experience, 2015
Neural Network-Based User-Independent Physical Activity Recognition for Mobile Devices.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2015, 2015
Proceedings of the 32nd International Conference on Machine Learning, 2015
Learning better while sending less: Communication-efficient online semi-supervised learning in client-server settings.
Proceedings of the 2015 IEEE International Conference on Data Science and Advanced Analytics, 2015
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the Cryptology and Network Security - 14th International Conference, 2015
2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the International Workshop on Innovative Software Development Methodologies and Practices, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the Information Security - 17th International Conference, 2014
Multi-tiered Security Architecture for ARM via the Virtualization and Security Extensions.
Proceedings of the 25th International Workshop on Database and Expert Systems Applications, 2014
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
2013
EAI Endorsed Trans. Mob. Commun. Appl., 2013
it Inf. Technol., 2013
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Lightweight Attestation and Secure Code Update for Multiple Separated Microkernel Tasks.
Proceedings of the Information Security, 16th International Conference, 2013
Proceedings of the Trusted Systems - 5th International Conference, 2013
Proceedings of the 12th International Conference on Machine Learning and Applications, 2013
Proceedings of the 2013 IEEE 13th International Conference on Data Mining, 2013
Proceedings of the Advances in Information Retrieval, 2013
Proceedings of the CyCAR'13, 2013
Proceedings of the Number Theory and Cryptography, 2013
Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013
2012
Proceedings of the Eleventh International Conference on Grammatical Inference, 2012
Proceedings of the 2012 International Conference on Privacy, 2012
Proceedings of the Computer Safety, Reliability, and Security, 2012
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2012
Proceedings of the Mobile Wireless Middleware, Operating Systems, and Applications, 2012
Proceedings of the ECAI 2012, 2012
Proceedings of CBMS 2012, 2012
2011
Datenschutz und Datensicherheit, 2011
Proceedings of the Security and Privacy in Communication Networks, 2011
Proceedings of the Advances in Information and Computer Security, 2011
Proceedings of the Information Systems Security - 7th International Conference, 2011
2010
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010
Proceedings of the Grammatical Inference: Theoretical Results and Applications, 2010
Proceedings of the 40. Jahrestagung der Gesellschaft für Informatik, Service Science - Neue Perspektiven für die Informatik, INFORMATIK 2010, Leipzig, Germany, September 27, 2010
Proceedings of the 5th Workshop on Embedded Systems Security, 2010
2009
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2009
Proceedings of the The Forth International Conference on Availability, 2009
IT-Sicherheit - Konzepte, Verfahren, Protokolle (6. Aufl.).
Oldenbourg, ISBN: 978-3-486-58999-3, 2009
2008
Inf. Secur. Tech. Rep., 2008
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008
Proceedings of the First ACM Conference on Wireless Network Security, 2008
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008
Proceedings of the Second International Conference on Emerging Security Information, 2008
Proceedings of the Information Security and Cryptology, 2008
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008
Proceedings of the The Third International Conference on Availability, 2008
IT-Sicherheit - Konzepte, Verfahren, Protokolle (5. Aufl.).
Oldenbourg, ISBN: 978-3-486-58270-3, 2008
2007
Datenschutz und Datensicherheit, 2007
Datenschutz und Datensicherheit, 2007
An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks.
Proceedings of the Information Security Applications, 8th International Workshop, 2007
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007
Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007
Proceedings of the 2007 International Workshop on Description Logics (DL2007), 2007
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Artificial Immune Systems for IT-Security (Künstliche Immunsysteme für IT-Sicherheit).
it Inf. Technol., 2006
Proceedings of the Intelligent Information Processing and Web Mining, 2006
On the Use of Hyperspheres in Artificial Immune Systems as Antibody Recognition Regions.
Proceedings of the Artificial Immune Systems, 5th International Conference, 2006
Proceedings of the Artificial Immune Systems, 5th International Conference, 2006
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006
IT-Sicherheit - Konzepte, Verfahren, Protokolle (4. Aufl.).
Oldenbourg, ISBN: 978-3-486-57851-5, 2006
2005
Ubiquitäre Sicherheit für dynamische, mobile Systeme. Eine Herausforderung für die IT-Sicherheit.
Prax. Inf.verarb. Kommun., 2005
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005
A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques.
Proceedings of the Artificial Immune Systems: 4th International Conference, 2005
Proceedings of the Genetic and Evolutionary Computation Conference, 2005
Proceedings of the 2005 International Workshop on Description Logics (DL2005), 2005
On the appropriateness of negative selection defined over Hamming shape-space as a network intrusion detection system.
Proceedings of the IEEE Congress on Evolutionary Computation, 2005
2004
NGN, All-IP, B3G: Enabler für das Future Net?!: Überblick über Entwicklungen im Bereich zukünftiger Netze.
Inform. Spektrum, 2004
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004
Proceedings of the Genetic and Evolutionary Computation, 2004
Proceedings of the E-Science and Grid - Ad-hoc-Netze, 2004
Proceedings of the E-Science and Grid - Ad-hoc-Netze, 2004
IT-Sicherheit - Konzepte, Verfahren, Protokolle (3. Aufl.).
Oldenbourg, ISBN: 978-3-486-20000-3, 2004
2003
Der elektronische Sicherheitsinspektor eSI: Ein Tool zur dynamischen Analyse der IT-Sicherheit eines Systems.
Proceedings of the Security, 2003
IT-Sicherheit - Konzepte, Verfahren, Protokolle (2. Aufl.).
Oldenbourg, ISBN: 978-3-486-27205-5, 2003
2001
Informationstechnik Tech. Inform., 2001
Internet Anonymity: Problems and Solutions.
Proceedings of the Trusted Information: The New Decade Challenge, 2001
2000
Proceedings of the 9th ACM SIGOPS European Workshop, 2000
GSFS - A New Group-Aware Cryptographic File System.
Proceedings of the Information Security for Global Information Infrastructures, 2000
1999
Improving Resource Management in Distributed Systems using Language-Level Structuring Concepts.
J. Supercomput., 1999
1997
MVS-SAT: a security administration tool to support SMF protocol data evaluation.
Proceedings of the Information Security in Research and Business, 1997
Developing secure applications: a systematic approach.
Proceedings of the Information Security in Research and Business, 1997
Evolving Software Tools for New Distributed Computing Environments.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1997
Proceedings of the 30th Annual Hawaii International Conference on System Sciences (HICSS-30), 1997
1996
On security models.
Proceedings of the Information Systems Security, 1996
1993
PhD thesis, 1993
1990
Proceedings of the Security and Persistence, 1990