Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Fredrik Valeur
2010 – today
- 2010
[j4]Davide Balzarotti, Greg Banks, Marco Cova, Viktoria Felmetsger, Richard A. Kemmerer, William K. Robertson, Fredrik Valeur, Giovanni Vigna: An Experience in Testing the Security of Real-World Electronic Voting Systems. IEEE Trans. Software Eng. 36(4): 453-473 (2010)
2000 – 2009
- 2009
[j3]Giovanni Vigna, Fredrik Valeur, Davide Balzarotti, William K. Robertson, Christopher Kruegel, Engin Kirda: Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries. Journal of Computer Security 17(3): 305-329 (2009)- 2008
[c12]Davide Balzarotti, Greg Banks, Marco Cova, Viktoria Felmetsger, Richard A. Kemmerer, William K. Robertson, Fredrik Valeur, Giovanni Vigna: Are your votes really counted?: testing the security of real-world electronic voting systems. ISSTA 2008: 237-248- 2006
[j2]Darren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Krügel: Anomalous system call detection. ACM Trans. Inf. Syst. Secur. 9(1): 61-93 (2006)
[c11]André Årnes, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer: Using Hidden Markov Models to Evaluate the Risks of Intrusions. RAID 2006: 145-164
[c10]Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Engin Kirda: An anomaly-driven reverse proxy for web applications. SAC 2006: 361-368- 2005
[b1]Christopher Kruegel, Fredrik Valeur, Giovanni Vigna: Intrusion Detection and Correlation - Challenges and Solutions. Advances in Information Security 14, Springer 2005, ISBN 978-0-387-23398-7, pp. 1-118
[c9]Fredrik Valeur, Darren Mutz, Giovanni Vigna: A Learning-Based Approach to the Detection of SQL Attacks. DIMVA 2005: 123-140- 2004
[j1]Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer: A Comprehensive Approach to Intrusion Detection Alert Correlation. IEEE Trans. Dependable Sec. Comput. 1(3): 146-169 (2004)
[c8]Christopher Krügel, William K. Robertson, Fredrik Valeur, Giovanni Vigna: Static Disassembly of Obfuscated Binaries. USENIX Security Symposium 2004: 255-270- 2003
[c7]Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur: Bayesian Event Classification for Intrusion Detection. ACSAC 2003: 14-23
[c6]Christopher Krügel, Darren Mutz, Fredrik Valeur, Giovanni Vigna: On the Detection of Anomalous System Call Arguments. ESORICS 2003: 326-343
[c5]William K. Robertson, Christopher Krügel, Darren Mutz, Fredrik Valeur: Run-time Detection of Heap-based Overflows. LISA 2003: 51-60
[c4]Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur: Topology-Based Detection of Anomalous BGP Messages. RAID 2003: 17-35
[c3]Giovanni Vigna, Fredrik Valeur, Richard A. Kemmerer: Designing and implementing a family of intrusion detection systems. ESEC / SIGSOFT FSE 2003: 88-97- 2002
[c2]Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richard A. Kemmerer: Composable Tools For Network Discovery and Security Analysis. ACSAC 2002: 14-24
[c1]Christopher Krügel, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer: Stateful Intrusion Detection for High-Speed Networks. IEEE Symposium on Security and Privacy 2002: 285-293
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:13 CEST by the dblp team



