Robin Sommer
Affiliations:- International Computer Science Institute (ICSI)
According to our database1,
Robin Sommer
authored at least 47 papers
between 2002 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2021
2020
Zeek-Osquery: Host-Network Correlation for Advanced Monitoring and Intrusion Detection.
Proceedings of the ICT Systems Security and Privacy Protection, 2020
2018
2017
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2017
2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the Passive and Active Measurement - 17th International Conference, 2016
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016
Spicy: a unified deep packet inspection framework for safely dissecting all your data.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
To Trust, or not to Trust, that is the Question: Structural Properties of X.509 Certificates.
Tiny Trans. Comput. Sci., 2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2015
Proceedings of the Multimedia Data Mining and Analytics - Disruptive Innovation, 2015
2014
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
HILTI: an Abstract Execution Environment for Deep, Stateful Network Traffic Analysis.
Proceedings of the 2014 Internet Measurement Conference, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Proceedings of the 22nd International World Wide Web Conference, 2013
Proceedings of the 22nd International World Wide Web Conference, 2013
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
Proceedings of the Passive and Active Measurement - 13th International Conference, 2012
2011
Proceedings of the 2011 New Security Paradigms Workshop, 2011
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011
2010
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
2009
An architecture for exploiting multi-core processors to parallelize network intrusion prevention.
Concurr. Comput. Pract. Exp., 2009
Proceedings of the Network and Distributed System Security Symposium, 2009
Proceedings of the Eight ACM Workshop on Hot Topics in Networks (HotNets-VIII), 2009
2008
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, 2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
2007
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test 2007, 2007
Proceedings of the 2nd USENIX Workshop on Hot Topics in Security, 2007
The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007
2006
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006
2005
PhD thesis, 2005
Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic.
Proceedings of the 5th Internet Measurement Conference, 2005
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005
Proceedings of the Detection of Intrusions and Malware, 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
2003
Proceedings of the Security, 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
2002
Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop, 2002