Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Michael Meier
Author information
- Universität Dortmund, Germany
Other persons with the same name
- Michael Meier 0002 — Universität Freiburg, Germany
- Michael Meier 0003 — vasp Datatecture GmbH, Switzerland
- Michael Meier 0004
2010 – today
- 2012
[j4]Ulrich Flegel, Michael Meier: Modeling and Describing Misuse Scenarios Using Signature-Nets and Event Description Language. it - Information Technology 54(2): 71-81 (2012)
[j3]Martin Apel, Michael Meier: Generalizing Behavioral Signatures for Detecting Unknown Malware Variants and Early Warning. Praxis der Informationsverarbeitung und Kommunikation 35(1): 17-24 (2012)
[e2]Nils Aschenbruck, Peter Martini, Michael Meier, Jens Tölle (Eds.): Future Security - 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4-6, 2012. Proceedings. Communications in Computer and Information Science 318, Springer 2012, ISBN 978-3-642-33160-2- 2011
[c18]Jan Treibig, Georg Hager, Gerhard Wellein, Michael Meier: Poster: LIKWID: lightweight performance tools. SC Companion 2011: 29-30- 2010
[c17]Armin Büscher, Michael Meier, Ralf Benzmüller: Throwing a MonkeyWrench into Web Attackers Plans. Communications and Multimedia Security 2010: 28-39
[c16]
[c15]Ulrich Flegel, Johannes Hoffmann, Michael Meier: Cooperation enablement for centralistic early warning systems. SAC 2010: 2001-2008
2000 – 2009
- 2009
[c14]Martin Apel, Joachim Biskup, Ulrich Flegel, Michael Meier: Towards Early Warning Systems - Challenges, Technologies and Architecture. CRITIS 2009: 151-164
[c13]Christian Bockermann, Martin Apel, Michael Meier: Learning SQL for Database Intrusion Detection Using Context-Sensitive Modelling (Extended Abstract). DIMVA 2009: 196-205
[c12]Martin Apel, Christian Bockermann, Michael Meier: Measuring similarity of malware behavior. LCN 2009: 891-898- 2008
[c11]Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier, René Rietz: Systematic Signature Engineering by Re-use of Snort Signatures. ACSAC 2008: 23-32
[c10]Joachim Biskup, Bernhard M. Hämmerli, Michael Meier, Sebastian Schmerl, Jens Tölle, Michael Vogel: 08102 Working Group -- Early Warning Systems. Network Attack Detection and Defense 2008- 2007
[b1]Michael Meier: Intrusion detection effektiv! - Modellierung und Analyse von Angriffsmustern. Brandenburg University of Technology 2007, ISBN 978-3-540-48251-2, pp. 1-209
[c9]Michael Meier, Ulrich Flegel, Sebastian Schmerl: Efficiency Issues of Rete-Based Expert Systems for Misuse Detection. ACSAC 2007: 151-160
[c8]Ulrich Flegel, Michael Meier: Authorization Architectures for Privacy-Respecting Surveillance. EuroPKI 2007: 1-17- 2006
[c7]Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier: Simplifying Signature Engineering by Reuse. ETRICS 2006: 436-450
[c6]Sebastian Schmerl, Ulrich Flegel, Michael Meier: Vereinfachung der Signaturentwicklung durch Wiederverwendung. Sicherheit 2006: 201-212- 2005
[c5]Michael Meier, Sebastian Schmerl, Hartmut König: Improving the Efficiency of Misuse Detection. DIMVA 2005: 188-205
[c4]Michael Meier, Sebastian Schmerl: Effiziente Analyseverfahren für Intrusion-Detection-Systeme. Sicherheit 2005: 209-220- 2004
[j2]Michael Meier, Ulrich Flegel, Hartmut König: Reactive Security - Intrusion Detection, Honeypots, and Vulnerability Assessment. Praxis der Informationsverarbeitung und Kommunikation 27(4): 186-187 (2004)
[c3]Michael Meier: A Model for the Semantics of Attack Signatures in Misuse Detection Systems. ISC 2004: 158-169
[e1]Ulrich Flegel, Michael Meier (Eds.): Detection of Intrusions and Malware & Vulnerability Assessment, GI SIG SIDAR Workshop, DIMVA 2004, Dortmund, Germany, July 6.7, 2004, Proceedings. LNI 46, GI 2004, ISBN 3-88579-375-X- 2003
[c2]Thomas Holz, Michael Meier, Hartmut König: High-Efficient Intrusion Detection Infrastructure. DFN-Arbeitstagung über Kommunikationsnetze 2003: 217-232- 2002
[j1]Thomas Holz, Michael Meier, Hartmut König: Bausteine für effiziente Intrusion-Detection-Systeme. Praxis der Informationsverarbeitung und Kommunikation 25(3): 144-157 (2002)
[c1]Michael Meier, Niels Bischof, Thomas Holz: SHEDEL-A Simple Hierarchical Event Description Language for Specifying Attack Signatures. SEC 2002: 559-572
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:11 CEST by the dblp team



