default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 59 matches
- 2023
- Artur Sterz, Robin Klose, Markus Sommer, Jonas Höchst, Jakob Link, Bernd Simon, Anja Klein, Matthias Hollick, Bernd Freisleben:
Energy-Efficient Decentralized Broadcasting in Wireless Multi-Hop Networks. Sensors 23(17): 7419 (2023) - Artur Sterz, Robin Klose, Markus Sommer, Jonas Höchst, Jakob Link, Bernd Simon, Anja Klein, Matthias Hollick, Bernd Freisleben:
Energy-efficient Broadcast Trees for Decentralized Data Dissemination in Wireless Networks. LCN 2023: 1-4 - 2021
- Jan Grashöfer, Peter Oettig, Robin Sommer, Tim Wojtulewicz, Hannes Hartenstein:
Advancing Protocol Diversity in Network Security Monitoring. CoRR abs/2106.12454 (2021) - 2020
- Steffen Haas, Robin Sommer, Mathias Fischer:
Zeek-Osquery: Host-Network Correlation for Advanced Monitoring and Intrusion Detection. SEC 2020: 248-262 - Steffen Haas, Robin Sommer, Mathias Fischer:
zeek-osquery: Host-Network Correlation for Advanced Monitoring and Intrusion Detection. CoRR abs/2002.04547 (2020) - 2019
- Robin Kruppe, Julian Oppermann, Lukas Sommer, Andreas Koch:
Extending LLVM for Lightweight SPMD Vectorization: Using SIMD and Vector Instructions Easily from Any Language. CGO 2019: 278-279 - 2018
- Jaeyoung Choi, Istemi Ekin Akkus, Serge Egelman, Gerald Friedland, Robin Sommer, Michael Carl Tschantz, Nicholas Weaver:
Cybercasing 2.0: You Get What You Pay For. CoRR abs/1811.06584 (2018) - 2017
- Johanna Amann, Robin Sommer:
Viable Protection of High-Performance Networks through Hardware/Software Co-Design. SDN-NFV@CODASPY 2017: 19-24 - 2016
- Robin Sommer, Johanna Amann, Seth Hall:
Spicy: a unified deep packet inspection framework for safely dissecting all your data. ACSAC 2016: 558-569 - Matthias Vallentin, Vern Paxson, Robin Sommer:
VAST: A Unified Platform for Interactive Network Forensics. NSDI 2016: 345-362 - Johanna Amann, Robin Sommer:
Exploring Tor's Activity Through Long-Term Passive TLS Traffic Measurement. PAM 2016: 3-15 - Marco Caselli, Emmanuele Zambon, Johanna Amann, Robin Sommer, Frank Kargl:
Specification Mining for Intrusion Detection in Networked Control Systems. USENIX Security Symposium 2016: 791-806 - 2015
- Oana Goga, Patrick Loiseau, Robin Sommer, Renata Teixeira, Krishna P. Gummadi:
On the Reliability of Profile Matching Across Large Online Social Networks. KDD 2015: 1799-1808 - Johanna Amann, Robin Sommer:
Providing Dynamic Control to Passive Network Security Monitoring. RAID 2015: 133-152 - Gerald Friedland, Adam Janin, Howard Lei, Jaeyoung Choi, Robin Sommer:
Content-Based Privacy for Consumer-Produced Multimedia. Multimedia Data Mining and Analytics 2015: 157-173 - Oana Goga, Patrick Loiseau, Robin Sommer, Renata Teixeira, Krishna P. Gummadi:
On the Reliability of Profile Matching Across Large Online Social Networks. CoRR abs/1506.02289 (2015) - Johanna Amann, Robin Sommer, Matthias Vallentin, Seth Hall:
To Trust, or not to Trust, that is the Question: Structural Properties of X.509 Certificates. Tiny Trans. Comput. Sci. 3 (2015) - 2014
- Dina Hadziosmanovic, Robin Sommer, Emmanuele Zambon, Pieter H. Hartel:
Through the eye of the PLC: semantic security monitoring for industrial processes. ACSAC 2014: 126-135 - Lorenzo De Carli, Robin Sommer, Somesh Jha:
Beyond Pattern Matching: A Concurrency Model for Stateful Deep Packet Inspection. CCS 2014: 1378-1390 - Robin Sommer, Matthias Vallentin, Lorenzo De Carli, Vern Paxson:
HILTI: an Abstract Execution Environment for Deep, Stateful Network Traffic Analysis. Internet Measurement Conference 2014: 461-474 - Johanna Amann, Seth Hall, Robin Sommer:
Count Me In: Viable Distributed Summary Statistics for Securing High-Speed Networks. RAID 2014: 320-340 - 2013
- B. Amann, Robin Sommer, Matthias Vallentin, Seth Hall:
No attack necessary: the surprising dynamics of SSL trust relationships. ACSAC 2013: 179-188 - Devdatta Akhawe, B. Amann, Matthias Vallentin, Robin Sommer:
Here's my cert, so trust me, maybe?: understanding TLS errors on the web. WWW 2013: 59-70 - Oana Goga, Howard Lei, Sree Hari Krishnan Parthasarathi, Gerald Friedland, Robin Sommer, Renata Teixeira:
Exploiting innocuous activity for correlating users across sites. WWW 2013: 447-458 - 2012
- Matthias Löbe, Christoph Aßmann, Richard Beyer, Jan Gaebel, Sebastian Kiunke, Edgar Lensing, Markus Nentwig, Christian Petzold, Antonia Siegert, Robin Sommerweiß, Lars Voitel:
Einsatzmöglichkeiten von CDISC ODM in der klinischen Forschung. GI-Jahrestagung 2012: 1295-1305 - Nadi Sarrar, Gregor Maier, Bernhard Ager, Robin Sommer, Steve Uhlig:
Investigating IPv6 Traffic - What Happened at the World IPv6 Day? PAM 2012: 11-20 - B. Amann, Robin Sommer, Aashish Sharma, Seth Hall:
A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence. RAID 2012: 314-333 - 2011
- Gregor Maier, Anja Feldmann, Vern Paxson, Robin Sommer, Matthias Vallentin:
An Assessment of Overt Malicious Activity Manifest in Residential Networks. DIMVA 2011: 144-163 - Gerald Friedland, Gregor Maier, Robin Sommer, Nicholas Weaver:
Sherlock holmes' evil twin: on the impact of global inference for online privacy. NSPW 2011: 105-114 - Robin Sommer, Davide Balzarotti, Gregor Maier:
Recent Advances in Intrusion Detection - 14th International Symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings. Lecture Notes in Computer Science 6961, Springer 2011, ISBN 978-3-642-23643-3 [contents]
skipping 29 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-04 15:13 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint