Obserwuj
Patrick Duessel
Patrick Duessel
ViacomCBS
Zweryfikowany adres z riskbeam.io
Tytuł
Cytowane przez
Cytowane przez
Rok
Learning and classification of malware behavior
K Rieck, T Holz, C Willems, P Düssel, P Laskov
International Conference on Detection of Intrusions and Malware, and …, 2008
7912008
Learning intrusion detection: supervised or unsupervised?
P Laskov, P Düssel, C Schäfer, K Rieck
International Conference on Image Analysis and Processing, 50-57, 2005
3332005
Cyber-critical infrastructure protection using real-time payload-based anomaly detection
P Düssel, C Gehl, P Laskov, JU Bußer, C Störmann, J Kästner
International Workshop on Critical Information Infrastructures Security, 85-97, 2009
902009
Method and apparatus for automatic comparison of data sequences using local and global relationships
K Rieck, P Laskov, K Mueller, P Duessel
US Patent 8,271,403, 2012
852012
Automatic feature selection for anomaly detection
M Kloft, U Brefeld, P Düessel, C Gehl, P Laskov
Proceedings of the 1st ACM workshop on Workshop on AISec, 71-76, 2008
682008
Detecting zero-day attacks using context-aware anomaly detection at the application-layer
P Duessel, C Gehl, U Flegel, S Dietrich, M Meier
International Journal of Information Security, 1-16, 2016
602016
Incorporation of application layer protocol syntax into anomaly detection
P Düssel, C Gehl, P Laskov, K Rieck
International Conference on Information Systems Security, 188-202, 2008
442008
Learning and classification of malware behavior
T Holz, C Willems, K Rieck, P Duessel, P Laskov
Fifth Conference on Detection of Intrusions and Malware & Vulnerability …, 2008
242008
ETHICAL ISSUES OF USER BEHAVIORAL ANALYSIS THROUGH MACHINE LEARNING.
G Thomas, P Duessel, M Meier
Journal of Information System Security 13 (1), 2017
112017
Detection of Intrusions and Malware, and Vulnerability Assessment
L Cavallaro, D Gruss, G Pellegrino, G Giacinto
Springer, 2008
92008
Ad-Hoc Queries over Document Collections–A Case Study
A Löser, S Lutter, P Düssel, V Markl
International Workshop on Business Intelligence for the Real-Time Enterprise …, 2009
62009
Detection of Unknown Cyber Attacks Using Convolution Kernels Over Attributed Language Models
P Duessel
Universitäts-und Landesbibliothek Bonn, 2018
32018
Tracing Privilege Misuse Through Behavioral Anomaly Detection in Geometric Spaces
P Duessel, S Luo, U Flegel, S Dietrich, M Meier
2020 13th International Conference on Systematic Approaches to Digital …, 2020
12020
Learning and Classification of Malware Behavior
P Düssel, T Holz, P Laskov, K Rieck, C Willems
2009
Panel/tutorial Co0Chairs
P Duessel, U Flegel, K Lynn, S Dietrich, D Frincke, Y Guan, M Huang, ...
Ad-hoc Queries over Document Collections-a Case Study (incomplete workshop discussion draft)
A Löser, S Lutter, P Düssel, V Markl
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–16