Sven Dietrich
According to our database1,
Sven Dietrich
authored at least 30 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the Computer Security - ESORICS 2024, 2024
2023
Network Attack Detection and Defense - AI-Powered Threats and Responses (Dagstuhl Seminar 23431).
Dagstuhl Reports, 2023
IEEE Access, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023
2022
IEEE Access, 2022
2021
V0Finder: Discovering the Correct Origin of Publicly Reported Software Vulnerabilities.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the ICT Systems Security and Privacy Protection, 2021
2020
Proceedings of the 13th International Conference on Systematic Approaches to Digital Forensic Engineering, 2020
2018
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
2017
Detecting zero-day attacks using context-aware anomaly detection at the application-layer.
Int. J. Inf. Sec., 2017
IEEE Secur. Priv., 2017
CoRR, 2017
2016
Dagstuhl Reports, 2016
Proceedings of the Who Are You?! Adventures in Authentication, 2016
2014
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014
2013
Proceedings of the Financial Cryptography and Data Security, 2013
2012
2011
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011
2010
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2008
Proceedings of the 3rd International Conference on Malicious and Unwanted Software, 2008
2007
login Usenix Mag., 2007
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
2002
2001
2000
Proceedings of the 14th Conference on Systems Administration (LISA 2000), 2000