David Jaeger

Orcid: 0000-0001-9463-3199

According to our database1, David Jaeger authored at least 20 papers between 2013 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
The (Persistent) Threat of Weak Passwords: Implementation of a Semi-automatic Password-Cracking Algorithm.
Proceedings of the Information Security Practice and Experience, 2019

2018
Enabling Big Data security analytics for advanced network attack detection.
PhD thesis, 2018

Fast Automated Processing and Evaluation of Identity Leaks.
Int. J. Parallel Program., 2018

Accelerating Event Processing for Security Analytics on a Distributed In-Memory Platform.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

2017
Evaluation of in-memory storage engine for machine learning analysis of security events.
Concurr. Comput. Pract. Exp., 2017

Towards a system for complex analysis of security events in large-scale networks.
Comput. Secur., 2017

Identifying Suspicious User Behavior with Neural Networks.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

2016
Advanced persistent threats: Behind the scenes.
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016

Automated parsing and interpretation of identity leaks.
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016

2015
Normalizing Security Events with a Hierarchical Knowledge Base.
Proceedings of the Information Security Theory and Practice, 2015

High-Speed Security Analytics Powered by In-Memory Machine Learning Engine.
Proceedings of the 14th International Symposium on Parallel and Distributed Computing, 2015

Parallel and distributed normalization of security events for instant attack analysis.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Multi-step Attack Pattern Detection on Normalized Event Logs.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Gathering and Analyzing Identity Leaks for Security Awareness.
Proceedings of the Technology and Practice of Passwords, 2014

Runtime Updatable and Dynamic Event Processing Using Embedded ECMAScript Engines.
Proceedings of the 2014 International Conference on IT Convergence and Security, 2014

2013
Security Event Correlation Supported by Multi-Core Architecture.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

A New Approach to Building a Multi-tier Direct Access Knowledgebase for IDS/SIEM Systems.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

Multi-core Supported High Performance Security Analytics.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

Pushing the Limits in Event Normalisation to Improve Attack Detection in IDS/SIEM Systems.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2013

Hierarchical object log format for normalisation of security events.
Proceedings of the 9th International Conference on Information Assurance and Security, 2013


  Loading...