Volgen
Patrick Duessel
Patrick Duessel
ViacomCBS
Geverifieerd e-mailadres voor riskbeam.io
Titel
Geciteerd door
Geciteerd door
Jaar
Learning and classification of malware behavior
K Rieck, T Holz, C Willems, P Düssel, P Laskov
International Conference on Detection of Intrusions and Malware, and …, 2008
7742008
Learning intrusion detection: supervised or unsupervised?
P Laskov, P Düssel, C Schäfer, K Rieck
International Conference on Image Analysis and Processing, 50-57, 2005
3242005
Cyber-critical infrastructure protection using real-time payload-based anomaly detection
P Düssel, C Gehl, P Laskov, JU Bußer, C Störmann, J Kästner
International Workshop on Critical Information Infrastructures Security, 85-97, 2009
892009
Method and apparatus for automatic comparison of data sequences using local and global relationships
K Rieck, P Laskov, K Mueller, P Duessel
US Patent 8,271,403, 2012
802012
Automatic feature selection for anomaly detection
M Kloft, U Brefeld, P Düessel, C Gehl, P Laskov
Proceedings of the 1st ACM workshop on Workshop on AISec, 71-76, 2008
652008
Detecting zero-day attacks using context-aware anomaly detection at the application-layer
P Duessel, C Gehl, U Flegel, S Dietrich, M Meier
International Journal of Information Security, 1-16, 2016
562016
Incorporation of application layer protocol syntax into anomaly detection
P Düssel, C Gehl, P Laskov, K Rieck
International Conference on Information Systems Security, 188-202, 2008
442008
Learning and classification of malware behavior
T Holz, C Willems, K Rieck, P Duessel, P Laskov
Fifth Conference on Detection of Intrusions and Malware & Vulnerability …, 2008
242008
ETHICAL ISSUES OF USER BEHAVIORAL ANALYSIS THROUGH MACHINE LEARNING.
G Thomas, P Duessel, M Meier
Journal of Information System Security 13 (1), 2017
112017
Detection of Intrusions and Malware, and Vulnerability Assessment
L Cavallaro, P Saxena, R Sekar, ...
Springer, 2008
92008
Ad-Hoc Queries over Document Collections–A Case Study
A Löser, S Lutter, P Düssel, V Markl
International Workshop on Business Intelligence for the Real-Time Enterprise …, 2009
62009
Detection of Unknown Cyber Attacks Using Convolution Kernels Over Attributed Language Models
P Duessel
Universitäts-und Landesbibliothek Bonn, 2018
32018
Tracing Privilege Misuse Through Behavioral Anomaly Detection in Geometric Spaces
P Duessel, S Luo, U Flegel, S Dietrich, M Meier
2020 13th International Conference on Systematic Approaches to Digital …, 2020
12020
Learning and Classification of Malware Behavior
P Düssel, T Holz, P Laskov, K Rieck, C Willems
2009
Panel/tutorial Co0Chairs
P Duessel, U Flegel, K Lynn, S Dietrich, D Frincke, Y Guan, M Huang, ...
Ad-hoc Queries over Document Collections-a Case Study (incomplete workshop discussion draft)
A Löser, S Lutter, P Düssel, V Markl
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–16