Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Ulrich Flegel
2010 – today
- 2013
[e3]Ulrich Flegel, Evangelos P. Markatos, William Robertson (Eds.): Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7591, Springer 2013, ISBN 978-3-642-37299-5- 2012
[j7]
[j6]Ulrich Flegel, Michael Meier: Modeling and Describing Misuse Scenarios Using Signature-Nets and Event Description Language. it - Information Technology 54(2): 71-81 (2012)
[c23]Ganna Monakova, Cristina Severin, Achim D. Brucker, Ulrich Flegel, Andreas Schaad: Monitoring Security and Safety of Assets in Supply Chains. Future Security 2012: 9-20- 2011
[c22]Asadul K. Islam, Malcolm Corney, George M. Mohay, Andrew J. Clark, Shane Bracher, Tobias Raub, Ulrich Flegel: Detecting Collusive Fraud in Enterprise Resource Planning Systems. IFIP Int. Conf. Digital Forensics 2011: 143-153- 2010
[c21]Ulrich Flegel, Johannes Hoffmann, Michael Meier: Cooperation enablement for centralistic early warning systems. SAC 2010: 2001-2008
[c20]Asadul K. Islam, Malcolm Corney, George M. Mohay, Andrew J. Clark, Shane Bracher, Tobias Raub, Ulrich Flegel: Fraud Detection in ERP Systems Using Scenario Matching. SEC 2010: 112-123
[p2]Ulrich Flegel, Julien Vayssière, Gunter Bitz: A State of the Art Survey of Fraud Detection Technology. Insider Threats in Cyber Security 2010: 73-84
[p1]Ulrich Flegel, Florian Kerschbaum, Philip Miseldine, Ganna Monakova, Richard Wacker, Frank Leymann: Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection. Insider Threats in Cyber Security 2010: 139-171
2000 – 2009
- 2009
[j5]Ulrich Flegel, Oliver Raabe, Richard Wacker: Technischer Datenschutz für IDS und FDS durch Pseudonymisierung. Datenschutz und Datensicherheit 33(12): 735-741 (2009)
[j4]
[c19]Luca Compagna, Ulrich Flegel, Volkmar Lotz: Towards Validating Security Protocol Deployment in the Wild. COMPSAC (2) 2009: 434-438
[c18]Martin Apel, Joachim Biskup, Ulrich Flegel, Michael Meier: Towards Early Warning Systems - Challenges, Technologies and Architecture. CRITIS 2009: 151-164
[e2]Ulrich Flegel, Danilo Bruschi (Eds.): Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings. Lecture Notes in Computer Science 5587, Springer 2009, ISBN 978-3-642-02917-2- 2008
[c17]Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier, René Rietz: Systematic Signature Engineering by Re-use of Snort Signatures. ACSAC 2008: 23-32
[c16]Marc Dacier, Ulrich Flegel, Ralph Holz, Norbert Luttenberger: 08102 Working Group -- Intrusion and Fraud Detection for Web Services. Network Attack Detection and Defense 2008
[c15]Philip Miseldine, Ulrich Flegel, Andreas Schaad: Supporting Evidence-Based Compliance Evaluation for Partial Business Process Outsourcing Scenarios. RELAW 2008: 31-34
[c14]Khaled Gaaloul, Andreas Schaad, Ulrich Flegel, François Charoy: A Secure Task Delegation Model for Workflows. SECURWARE 2008: 10-15- 2007
[b2]Ulrich Flegel: Privacy-Respecting Intrusion Detection. Advances in Information Security 35, Springer 2007, ISBN 978-0-387-34346-4, pp. 1-307
[c13]Michael Meier, Ulrich Flegel, Sebastian Schmerl: Efficiency Issues of Rete-Based Expert Systems for Misuse Detection. ACSAC 2007: 151-160
[c12]Ulrich Flegel, Michael Meier: Authorization Architectures for Privacy-Respecting Surveillance. EuroPKI 2007: 1-17- 2006
[c11]Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier: Simplifying Signature Engineering by Reuse. ETRICS 2006: 436-450
[c10]Ulrich Flegel, Joachim Biskup: Requirements of Information Reductions for Cooperating Intrusion Detection Agents. ETRICS 2006: 466-480
[c9]Sebastian Schmerl, Ulrich Flegel, Michael Meier: Vereinfachung der Signaturentwicklung durch Wiederverwendung. Sicherheit 2006: 201-212- 2005
[b1]Ulrich Flegel: Pseudonymizing audit data for privacy respecting misuse detection. Dortmund University of Technology 2005, pp. 1-407
[c8]Ulrich Flegel: Evaluating the Design of an Audit Data Pseudonymizer Using Basic Building Blocks for Anonymity. Sicherheit 2005: 221-232- 2004
[j3]Michael Meier, Ulrich Flegel, Hartmut König: Reactive Security - Intrusion Detection, Honeypots, and Vulnerability Assessment. Praxis der Informationsverarbeitung und Kommunikation 27(4): 186-187 (2004)
[e1]Ulrich Flegel, Michael Meier (Eds.): Detection of Intrusions and Malware & Vulnerability Assessment, GI SIG SIDAR Workshop, DIMVA 2004, Dortmund, Germany, July 6.7, 2004, Proceedings. LNI 46, GI 2004, ISBN 3-88579-375-X- 2003
[j2]Ulrich Flegel: Anonyme Audit-Daten im Überblick - Architekturen für anonyme Autorisierungen und Audit-Daten. Datenschutz und Datensicherheit 27(5) (2003)
[j1]Christian Altenschmidt, Joachim Biskup, Ulrich Flegel, Yücel Karabulut: Secure Mediation: Requirements, Design, and Architecture. Journal of Computer Security 11(3): 365-398 (2003)
[c7]Ulrich Flegel: Ein Architektur-Modell für anonyme Autorisierungen und Überwachungsdaten. GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit") 2003: 293-304- 2002
[c6]Joachim Biskup, Ulrich Flegel: Ausgleich von Datenschutz und Überwachung mit technischer Zweckbindung am Beispiel eines Pseudonymisierers. GI Jahrestagung 2002: 488-496
[c5]- 2000
[c4]Joachim Biskup, Ulrich Flegel: Threshold-based identity recovery for privacy enhanced applications. ACM Conference on Computer and Communications Security 2000: 71-79
[c3]Joachim Biskup, Ulrich Flegel: On Pseudonymization of Audit Data for Intrusion Detection. Workshop on Design Issues in Anonymity and Unobservability 2000: 161-180
[c2]Joachim Biskup, Ulrich Flegel: Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection. Recent Advances in Intrusion Detection 2000: 28-48
1990 – 1999
- 1998
[c1]Joachim Biskup, Ulrich Flegel, Yücel Karabulut: Secure Mediation: Requirements and Design. DBSec 1998: 127-140
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:21 CEST by the dblp team



