Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Fredrik Valeur
@article{DBLP:journals/tse/BalzarottiBCFKRVV10, author = {Davide Balzarotti and Greg Banks and Marco Cova and Viktoria Felmetsger and Richard A. Kemmerer and William K. Robertson and Fredrik Valeur and Giovanni Vigna}, title = {An Experience in Testing the Security of Real-World Electronic Voting Systems}, journal = {{IEEE} Trans. Software Eng.}, volume = {36}, number = {4}, pages = {453--473}, year = {2010}, url = {https://doi.org/10.1109/TSE.2009.53}, doi = {10.1109/TSE.2009.53}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/BalzarottiBCFKRVV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/VignaVBRKK09, author = {Giovanni Vigna and Fredrik Valeur and Davide Balzarotti and William K. Robertson and Christopher Kruegel and Engin Kirda}, title = {Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and {SQL} queries}, journal = {J. Comput. Secur.}, volume = {17}, number = {3}, pages = {305--329}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0321}, doi = {10.3233/JCS-2009-0321}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/VignaVBRKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/BalzarottiBCFKRVV08, author = {Davide Balzarotti and Greg Banks and Marco Cova and Viktoria Felmetsger and Richard A. Kemmerer and William K. Robertson and Fredrik Valeur and Giovanni Vigna}, editor = {Barbara G. Ryder and Andreas Zeller}, title = {Are your votes \emph{really} counted?: testing the security of real-world electronic voting systems}, booktitle = {Proceedings of the {ACM/SIGSOFT} International Symposium on Software Testing and Analysis, {ISSTA} 2008, Seattle, WA, USA, July 20-24, 2008}, pages = {237--248}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1390630.1390660}, doi = {10.1145/1390630.1390660}, timestamp = {Tue, 06 Nov 2018 16:57:30 +0100}, biburl = {https://dblp.org/rec/conf/issta/BalzarottiBCFKRVV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MutzVVK06, author = {Darren Mutz and Fredrik Valeur and Giovanni Vigna and Christopher Kr{\"{u}}gel}, title = {Anomalous system call detection}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {9}, number = {1}, pages = {61--93}, year = {2006}, url = {https://doi.org/10.1145/1127345.1127348}, doi = {10.1145/1127345.1127348}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MutzVVK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ArnesVVK06, author = {Andr{\'{e}} {\AA}rnes and Fredrik Valeur and Giovanni Vigna and Richard A. Kemmerer}, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {Using Hidden Markov Models to Evaluate the Risks of Intrusions}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, pages = {145--164}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214\_8}, doi = {10.1007/11856214\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/ArnesVVK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/ValeurVKK06, author = {Fredrik Valeur and Giovanni Vigna and Christopher Kr{\"{u}}gel and Engin Kirda}, editor = {Hisham Haddad}, title = {An anomaly-driven reverse proxy for web applications}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006}, pages = {361--368}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1141277.1141361}, doi = {10.1145/1141277.1141361}, timestamp = {Tue, 06 Nov 2018 11:06:49 +0100}, biburl = {https://dblp.org/rec/conf/sac/ValeurVKK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/KruegelVV05, author = {Christopher Kruegel and Fredrik Valeur and Giovanni Vigna}, title = {Intrusion Detection and Correlation - Challenges and Solutions}, series = {Advances in Information Security}, volume = {14}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b101493}, doi = {10.1007/B101493}, isbn = {978-0-387-23398-7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/KruegelVV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/ValeurMV05, author = {Fredrik Valeur and Darren Mutz and Giovanni Vigna}, editor = {Klaus Julisch and Christopher Kr{\"{u}}gel}, title = {A Learning-Based Approach to the Detection of {SQL} Attacks}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, Second International Conference, {DIMVA} 2005, Vienna, Austria, July 7-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3548}, pages = {123--140}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506881\_8}, doi = {10.1007/11506881\_8}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/ValeurMV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ValeurVKK04, author = {Fredrik Valeur and Giovanni Vigna and Christopher Kr{\"{u}}gel and Richard A. Kemmerer}, title = {A Comprehensive Approach to Intrusion Detection Alert Correlation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {1}, number = {3}, pages = {146--169}, year = {2004}, url = {https://doi.org/10.1109/TDSC.2004.21}, doi = {10.1109/TDSC.2004.21}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ValeurVKK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KruegelRVV04, author = {Christopher Kr{\"{u}}gel and William K. Robertson and Fredrik Valeur and Giovanni Vigna}, editor = {Matt Blaze}, title = {Static Disassembly of Obfuscated Binaries}, booktitle = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13, 2004, San Diego, CA, {USA}}, pages = {255--270}, publisher = {{USENIX}}, year = {2004}, url = {http://www.usenix.org/publications/library/proceedings/sec04/tech/kruegel.html}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/KruegelRVV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KruegelMRV03, author = {Christopher Kr{\"{u}}gel and Darren Mutz and William K. Robertson and Fredrik Valeur}, title = {Bayesian Event Classification for Intrusion Detection}, booktitle = {19th Annual Computer Security Applications Conference {(ACSAC} 2003), 8-12 December 2003, Las Vegas, NV, {USA}}, pages = {14--23}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/CSAC.2003.1254306}, doi = {10.1109/CSAC.2003.1254306}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KruegelMRV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KruegelMVV03, author = {Christopher Kr{\"{u}}gel and Darren Mutz and Fredrik Valeur and Giovanni Vigna}, editor = {Einar Snekkenes and Dieter Gollmann}, title = {On the Detection of Anomalous System Call Arguments}, booktitle = {Computer Security - {ESORICS} 2003, 8th European Symposium on Research in Computer Security, Gj{\o}vik, Norway, October 13-15, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2808}, pages = {326--343}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39650-5\_19}, doi = {10.1007/978-3-540-39650-5\_19}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KruegelMVV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lisa/RobertsonKMV03, author = {William K. Robertson and Christopher Kr{\"{u}}gel and Darren Mutz and Fredrik Valeur}, editor = {{\AE}leen Frisch}, title = {Run-time Detection of Heap-based Overflows}, booktitle = {Proceedings of the 17th Conference on Systems Administration {(LISA} 2003), San Diego, California, USA, October 26-31, 2003}, pages = {51--60}, publisher = {{USENIX}}, year = {2003}, url = {http://www.usenix.org/publications/library/proceedings/lisa03/tech/robertson.html}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lisa/RobertsonKMV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KruegelMRV03, author = {Christopher Kr{\"{u}}gel and Darren Mutz and William K. Robertson and Fredrik Valeur}, editor = {Giovanni Vigna and Erland Jonsson and Christopher Kr{\"{u}}gel}, title = {Topology-Based Detection of Anomalous {BGP} Messages}, booktitle = {Recent Advances in Intrusion Detection, 6th International Symposium, {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2820}, pages = {17--35}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45248-5\_2}, doi = {10.1007/978-3-540-45248-5\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/KruegelMRV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/VignaVK03, author = {Giovanni Vigna and Fredrik Valeur and Richard A. Kemmerer}, editor = {Jukka Paakki and Paola Inverardi}, title = {Designing and implementing a family of intrusion detection systems}, booktitle = {Proceedings of the 11th {ACM} {SIGSOFT} Symposium on Foundations of Software Engineering 2003 held jointly with 9th European Software Engineering Conference, {ESEC/FSE} 2003, Helsinki, Finland, September 1-5, 2003}, pages = {88--97}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/940071.940084}, doi = {10.1145/940071.940084}, timestamp = {Tue, 01 Feb 2022 10:45:16 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/VignaVK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/VignaVZK02, author = {Giovanni Vigna and Fredrik Valeur and Jingyu Zhou and Richard A. Kemmerer}, title = {Composable Tools For Network Discovery and Security Analysis}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {14--24}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176274}, doi = {10.1109/CSAC.2002.1176274}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/VignaVZK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KrugelVVK02, author = {Christopher Kr{\"{u}}gel and Fredrik Valeur and Giovanni Vigna and Richard A. Kemmerer}, title = {Stateful Intrusion Detection for High-Speed Networks}, booktitle = {2002 {IEEE} Symposium on Security and Privacy, Berkeley, California, USA, May 12-15, 2002}, pages = {285--293}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/SECPRI.2002.1004378}, doi = {10.1109/SECPRI.2002.1004378}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/KrugelVVK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.