Sebastian Roschke

According to our database1, Sebastian Roschke authored at least 17 papers between 2009 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
High-quality attack graph-based IDS correlation.
Log. J. IGPL, 2013

2012
An alert correlation platform for memory-supported techniques.
Concurr. Comput. Pract. Exp., 2012

2011
Towards high quality security event correlation using in-memory and multi-core processing.
PhD thesis, 2011

IPv4/IPv6 Handoff on Lock-Keeper for High Flexibility and Security.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

BALG: Bypassing Application Layer Gateways using multi-staged encrypted shellcodes.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

An Integrated Network Scanning Tool for Attack Graph Construction.
Proceedings of the Advances in Grid and Pervasive Computing - 6th International Conference, 2011

A New Alert Correlation Algorithm Based on Attack Graph.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

2010
A Flexible and Efficient Alert Correlation Platform for Distributed IDS.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Secure Communication Using Identity Based Encryption.
Proceedings of the Communications and Multimedia Security, 2010

A Specialized Tool for Simulating Lock-Keeper Data Transfer.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

Using vulnerability information and attack graphs for intrusion detection.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
A Theoretical Model of Lock-Keeper Data Exchange and its Practical Verification.
Proceedings of the NPC 2009, 2009

Towards Unifying Vulnerability Information for Attack Graph Construction.
Proceedings of the Information Security, 12th International Conference, 2009

Implementing IDS Management on Lock-Keeper.
Proceedings of the Information Security Practice and Experience, 2009

Intrusion Detection in the Cloud.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

Remodeling Vulnerability Information.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

An Extensible and Virtualization-Compatible IDS Management Architecture.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...