Michael Meier
Orcid: 0009-0006-8199-5004Affiliations:
- University of Bonn, Institute of Computer Science
- Dortmund University of Technology, Department of Computer Science
- Brandenburg University of Technology, Computer Science Department
According to our database1,
Michael Meier
authored at least 61 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the Sicherheit, 2024
You Can Run But You Can't Hide: Runtime Protection Against Malicious Package Updates For Node.js.
Proceedings of the Sicherheit, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Assessing the Impact of Large Language Models on Cybersecurity Education: A Study of ChatGPT's Influence on Student Performance.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Analyzing the Feasibility of Privacy-Respecting Automated Tracking of Devices Fleeing a Burglary.
Proceedings of the 19th International Conference on Wireless and Mobile Computing, 2023
On the Feasibility of Detecting Non-Cooperative Wi-Fi Devices via a Single Wi-Fi-Router.
Proceedings of the WiP Proceedings of the Thirteenth International Conference on Indoor Positioning and Indoor Navigation - Work-in-Progress Papers (IPIN-WiP 2023) co-located with 13th International Conference on Indoor Positioning and Indoor Navigation (IPIN 2023), Nuremberg, Germany, September 25, 2023
2022
On the Feasibility of Supervised Machine Learning for the Detection of Malicious Software Packages.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Automated identification of vulnerable devices in networks using traffic data and deep learning.
Int. J. Inf. Priv. Secur. Integr., 2021
2020
If You've Seen One, You've Seen Them All: Leveraging AST Clustering Using MCL to Mimic Expertise to Detect Software Supply Chain Attacks.
CoRR, 2020
Utility Requirement Description for Utility-Preserving and Privacy-Respecting Data Pseudonymization.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020
Proceedings of the 13th International Conference on Systematic Approaches to Digital Forensic Engineering, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Credential Intelligence Agency: A Threat Intelligence Approach to Mitigate Identity Theft.
Proceedings of the Information Systems Security and Privacy - 6th International Conference, 2020
Proceedings of the EICC 2020: European Interdisciplinary Cybersecurity Conference, 2020
Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020
An investigation on the feasibility of the bluetooth frequency hopping mechanism for the use as a covert channel technique.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
Generalizing the phishing principle: analyzing user behavior in response to controlled stimuli for IT security awareness assessment.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition, 2018
Proceedings of the Sicherheit 2018, 2018
Sammlung geleakter Identitätsdaten zur Vorbereitung proaktiver Opfer-Warnung.
Proceedings of the Multikonferenz Wirtschaftsinformatik 2018: Data driven X, 2018
Proceedings of the 15th ACM International Conference on Computing Frontiers, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Detecting zero-day attacks using context-aware anomaly detection at the application-layer.
Int. J. Inf. Sec., 2017
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
Towards a Toolkit for Utility and Privacy-Preserving Transformation of Semi-structured Data Using Data Pseudonymization.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017
2016
Secur. Commun. Networks, 2016
Proceedings of the 41st IEEE Conference on Local Computer Networks Workshops, 2016
2015
Security and Privacy Policy Languages: A Survey, Categorization and Gap Identification.
CoRR, 2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Proceedings of the Sicherheit 2014: Sicherheit, 2014
Towards Suppressing Attacks on and Improving Resilience of Building Automation Systems - an Approach Exemplified Using BACnet.
Proceedings of the Sicherheit 2014: Sicherheit, 2014
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014
Proceedings of the ISSE 2014, 2014
Proceedings of the 6th International Conference on Cyber Conflict, 2014
2012
Generalizing Behavioral Signatures for Detecting Unknown Malware Variants and Early Warning.
Prax. Inf.verarb. Kommun., 2012
Modeling and Describing Misuse Scenarios Using Signature-Nets and Event Description Language.
it Inf. Technol., 2012
2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the Communications and Multimedia Security, 2010
2009
Learning SQL for Database Intrusion Detection using Context-Sensitive Modelling.
Proceedings of the LWA 2009: Workshop-Woche: Lernen, 2009
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009
Learning SQL for Database Intrusion Detection Using Context-Sensitive Modelling (Extended Abstract).
Proceedings of the Detection of Intrusions and Malware, 2009
Proceedings of the Critical Information Infrastructures Security, 2009
2008
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
2007
PhD thesis, 2007
Proceedings of the Public Key Infrastructure, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
Proceedings of the Sicherheit 2006: Sicherheit, 2006
Proceedings of the Emerging Trends in Information and Communication Security, 2006
2005
Proceedings of the Sicherheit 2005: Sicherheit, 2005
Proceedings of the Detection of Intrusions and Malware, 2005
2004
Prax. Inf.verarb. Kommun., 2004
Proceedings of the Information Security, 7th International Conference, 2004
2003
2002
Prax. Inf.verarb. Kommun., 2002
SHEDEL-A Simple Hierarchical Event Description Language for Specifying Attack Signatures.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002