


default search action
Christian Seifert
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c24]Gary D. Lopez Munoz, Amanda J. Minnich, Roman Lutz, Richard Lundeen, Raja Sekhar Rao Dheekonda, Nina Chikanov, Bolor-Erdene Jagdagdorj, Martin Pouliot, Shiven Chawla, Whitney Maxwell, Blake Bullwinkel, Katherine Pratt, Joris de Gruyter, Charlotte Siska, Pete Bryan, Tori Westerhoff, Chang Kawaguchi, Christian Seifert, Ram Shankar Siva Kumar, Yonatan Zunger:
PyRIT: A Framework for Security Risk Identification and Red Teaming in Generative AI Systems. CAMLIS 2024: 224-241 - [i5]Katharina Klioba, Christian Seifert:
Approximation of Random Evolution Equations. CoRR abs/2404.07660 (2024) - [i4]Emman Haider, Daniel Perez-Becker, Thomas Portet, Piyush Madan, Amit Garg, David Majercak, Wen Wen, Dongwoo Kim, Ziyi Yang, Jianwen Zhang, Hiteshi Sharma, Blake Bullwinkel, Martin Pouliot, Amanda J. Minnich, Shiven Chawla
, Solianna Herrera, Shahed Warreth, Maggie Engler, Gary Lopez, Nina Chikanov, Raja Sekhar Rao Dheekonda, Bolor-Erdene Jagdagdorj, Roman Lutz, Richard Lundeen, Tori Westerhoff, Pete Bryan, Christian Seifert, Ram Shankar Siva Kumar, Andrew Berkley, Alex Kessler:
Phi-3 Safety Post-Training: Aligning Language Models with a "Break-Fix" Cycle. CoRR abs/2407.13833 (2024) - [i3]Gary D. Lopez Munoz, Amanda J. Minnich, Roman Lutz, Richard Lundeen, Raja Sekhar Rao Dheekonda, Nina Chikanov, Bolor-Erdene Jagdagdorj, Martin Pouliot, Shiven Chawla
, Whitney Maxwell, Blake Bullwinkel, Katherine Pratt, Joris de Gruyter, Charlotte Siska, Pete Bryan, Tori Westerhoff, Chang Kawaguchi, Christian Seifert, Ram Shankar Siva Kumar, Yonatan Zunger:
PyRIT: A Framework for Security Risk Identification and Red Teaming in Generative AI System. CoRR abs/2410.02828 (2024) - 2023
- [j7]Clemens Bombach
, Fabian Gabel
, Christian Seifert
, Martin Tautenhahn
:
Observability for Non-autonomous Systems. SIAM J. Control. Optim. 61(1): 315-341 (2023) - [c23]Fikret Basic, Christian Seifert, Christian Steger, Robert Kofler:
Secure Data Acquisition for Battery Management Systems. DSD 2023: 553-560 - [i2]Fikret Basic, Christian Steger, Christian Seifert, Robert Kofler:
Trust your BMS: Designing a Lightweight Authentication Architecture for Industrial Networks. CoRR abs/2311.05498 (2023) - 2022
- [c22]Rakshit Agrawal, Jack W. Stokes, Lukas Rist, Ryan Littlefield, Xun Fan, Ken Hollis, Zane Coppedge, Noah Chesterman, Christian Seifert:
Long-Term Study of Honeypots in a Public Cloud. DSN (Supplements) 2022: 1-4 - [c21]Fikret Basic, Christian Steger, Christian Seifert, Robert Kofler:
Trust your BMS: Designing a Lightweight Authentication Architecture for Industrial Networks. ICIT 2022: 1-6 - 2021
- [c20]Talha Ongun, Jack W. Stokes, Jonathan Bar Or, Ke Tian, Farid Tajaddodianfar, Joshua Neil, Christian Seifert, Alina Oprea, John C. Platt:
Living-Off-The-Land Command Detection Using Active Learning. RAID 2021: 442-455 - [i1]Talha Ongun, Jack W. Stokes, Jonathan Bar Or, Ke Tian, Farid Tajaddodianfar, Joshua Neil, Christian Seifert, Alina Oprea, John C. Platt:
Living-Off-The-Land Command Detection Using Active Learning. CoRR abs/2111.15039 (2021) - 2020
- [j6]Dennis Gallaun
, Christian Seifert
, Martin Tautenhahn
:
Sufficient Criteria and Sharp Geometric Conditions for Observability in Banach Spaces. SIAM J. Control. Optim. 58(4): 2639-2657 (2020) - [c19]Alexander Rech, Lukas Gressl, Fikret Basic, Christian Seifert, Christian Steger, Andreas Daniel Sinnhofer:
Multi-Layered IoT System Design Towards End-to-End Secure Communication. IECON 2020: 2213-2220
2010 – 2019
- 2019
- [c18]Md Amran Siddiqui, Jack W. Stokes, Christian Seifert, Evan Argyle, Robert McCann
, Joshua Neil, Justin Carroll:
Detecting Cyber Attacks Using Anomaly Detection with Explanations and Expert Feedback. ICASSP 2019: 2872-2876 - [c17]Jack W. Stokes, Christian Seifert, Jerry Li, Nizar Hejazi:
Detection of Prevalent Malware Families with Deep Learning. MILCOM 2019: 1-8 - 2016
- [c16]Jack W. Stokes, Himanshu Chandola, Christian Seifert, Tim Burrell:
MART: Targeted attack detection on a compromised network. MILCOM 2016: 988-997 - 2015
- [j5]Maxime Louet, Christian Seifert, Ulf Hensen, Frauke Gräter
:
Dynamic Allostery of the Catabolite Activator Protein Revealed by Interatomic Forces. PLoS Comput. Biol. 11(8) (2015) - 2014
- [j4]Zoltan Palmai
, Christian Seifert, Frauke Gräter
, Erika Balog
:
An Allosteric Signaling Pathway of Human 3-Phosphoglycerate Kinase from Force Distribution Analysis. PLoS Comput. Biol. 10(1) (2014) - 2013
- [c15]Christian Seifert, Jack W. Stokes, Christina Colcernian, John C. Platt, Long Lu:
Robust scareware image detection. ICASSP 2013: 2920-2924 - 2012
- [c14]Clemens Kolbitsch, Benjamin Livshits, Benjamin G. Zorn, Christian Seifert:
Rozzle: De-cloaking Internet Malware. IEEE Symposium on Security and Privacy 2012: 443-457 - 2011
- [j3]Wolfram Stacklies, Christian Seifert, Frauke Graeter:
Implementation of Force Distribution Analysis for Molecular Dynamics simulations. BMC Bioinform. 12: 101 (2011) - [c13]Charlie Curtsinger, Benjamin Livshits, Benjamin G. Zorn, Christian Seifert:
ZOZZLE: Fast and Precise In-Browser JavaScript Malware Detection. USENIX Security Symposium 2011 - [c12]Junjie Zhang, Christian Seifert, Jack W. Stokes, Wenke Lee:
ARROW: GenerAting SignatuRes to Detect DRive-By DOWnloads. WWW 2011: 187-196 - 2010
- [c11]Julia Narvaez, Barbara Endicott-Popovsky, Christian Seifert, Chiraag Uday Aval, Deborah A. Frincke:
Drive-by-Downloads. HICSS 2010: 1-10 - [c10]Jack W. Stokes, Reid Andersen, Christian Seifert, Kumar Chellapilla:
WebCop: Locating Neighborhoods of Malware on the Web. LEET 2010 - [c9]Julia Narvaez, Chiraag Uday Aval, Barbara Endicott-Popovsky, Christian Seifert, Ashish Malviya, Doug Nordwall:
Assessment of Virtualization as a Sensor Technique. SADFE 2010: 61-65
2000 – 2009
- 2009
- [c8]Christian Seifert, Vipul Delwadia, Peter Komisarczuk, David Stirling, Ian Welch:
Measurement Study on Malicious Web Servers in the .nz Domain. ACISP 2009: 8-25 - [c7]David Stirling, Ian Welch, Peter Komisarczuk, Christian Seifert:
Automating Malware Scanning Using Workflows. CCGRID 2009: 562-567 - [c6]Barbara Endicott-Popovsky, Julia Narvaez, Christian Seifert, Deborah A. Frincke, Lori Ross O'Neil
, Chiraag Uday Aval:
Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks. HCI (16) 2009: 138-147 - [c5]Christian Seifert, Peter Komisarczuk, Ian Welch:
True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots. SECURWARE 2009: 63-69 - 2008
- [j2]Christoph Mulert
, Christian Seifert, Gregor Leicht
, Valerie Kirsch
, Matthias Ertl
, Susanne Karch, Matthias Moosmann, Jürgen Lutz, Hans-Jürgen Möller, Ulrich Hegerl
, Oliver Pogarell, Lorenz Jäger:
Single-trial coupling of EEG and fMRI reveals the involvement of early anterior cingulate cortex activation in effortful decision making. NeuroImage 42(1): 158-168 (2008) - [c4]Christian Seifert, Barbara Endicott-Popovsky, Deborah A. Frincke, Peter Komisarczuk, Radu Muschevici, Ian Welch
:
Identifying and Analyzing Web Server Attacks. IFIP Int. Conf. Digital Forensics 2008: 151-161 - [c3]Christian Seifert, Ian Welch, Peter Komisarczuk, Chiraag Uday Aval, Barbara Endicott-Popovsky:
Identification of malicious web pages through analysis of underlying DNS and web server relationships. LCN 2008: 935-941 - [c2]Christian Seifert, Ian Welch
, Peter Komisarczuk:
Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots. SAC 2008: 1426-1432 - 2007
- [j1]Christian Seifert, Ramon Steenson, Ian Welch, Peter Komisarczuk, Barbara Endicott-Popovsky:
Capture - A behavioral analysis tool for applications and documents. Digit. Investig. 4(Supplement): 23-30 (2007) - [c1]Peter Komisarczuk, Christian Seifert, Dean Pemberton:
Grid Enabled Internet Instruments. GLOBECOM 2007: 1906-1911
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-08 01:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint