Outside the closed world: On using machine learning for network intrusion detection R Sommer, V Paxson 2010 IEEE symposium on security and privacy, 305-316, 2010 | 2003 | 2010 |
Enhancing byte-level network intrusion detection signatures with context R Sommer, V Paxson Proceedings of the 10th ACM conference on Computer and communications …, 2003 | 423 | 2003 |
Exploiting innocuous activity for correlating users across sites O Goga, H Lei, SHK Parthasarathi, G Friedland, R Sommer, R Teixeira Proceedings of the 22nd international conference on World Wide Web, 447-458, 2013 | 308 | 2013 |
Dynamic application-layer protocol analysis for network intrusion detection H Dreger, A Feldmann, M Mai, V Paxson, R Sommer 15th USENIX security symposium, 257-272, 2006 | 292 | 2006 |
Through the eye of the PLC: semantic security monitoring for industrial processes D Hadžiosmanović, R Sommer, E Zambon, PH Hartel Proceedings of the 30th Annual Computer Security Applications Conference …, 2014 | 269 | 2014 |
The NIDS cluster: Scalable, stateful network intrusion detection on commodity hardware M Vallentin, R Sommer, J Lee, C Leres, V Paxson, B Tierney Recent Advances in Intrusion Detection: 10th International Symposium, RAID …, 2007 | 212 | 2007 |
Operational experiences with high-volume network intrusion detection H Dreger, A Feldmann, V Paxson, R Sommer Proceedings of the 11th ACM conference on Computer and communications …, 2004 | 210 | 2004 |
Recent Advances in Intrusion Detection JHA SOMESH, R SOMMER, C KREIBICH vol 6307, 15, 2010 | 175 | 2010 |
Cybercasing the Joint: On the Privacy Implications of {Geo-Tagging} G Friedland, R Sommer 5th USENIX workshop on Hot Topics in Security (HotSec 10), 2010 | 174 | 2010 |
NetFlow: Information loss or win? R Sommer, A Feldmann Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, 173-174, 2002 | 160 | 2002 |
On the reliability of profile matching across large online social networks O Goga, P Loiseau, R Sommer, R Teixeira, KP Gummadi Proceedings of the 21th ACM SIGKDD international conference on knowledge …, 2015 | 159 | 2015 |
binpac: A yacc for writing application protocol parsers R Pang, V Paxson, R Sommer, L Peterson Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, 289-300, 2006 | 158 | 2006 |
Building a time machine for efficient recording and retrieval of high-volume network traffic S Kornexl, V Paxson, H Dreger, A Feldmann, R Sommer 5th Internet Measurement Conference, 267-272, 2005 | 152 | 2005 |
Here's my cert, so trust me, maybe? Understanding TLS errors on the web D Akhawe, J Amann, M Vallentin, R Sommer Proceedings of the 22nd international conference on World Wide Web, 59-70, 2013 | 136 | 2013 |
Enriching network security analysis with time travel G Maier, R Sommer, H Dreger, A Feldmann, V Paxson, F Schneider Proceedings of the ACM SIGCOMM 2008 conference on Data communication, 183-194, 2008 | 133 | 2008 |
Detecting Forged TCP Reset Packets. N Weaver, R Sommer, V Paxson NDSS, 2009 | 106 | 2009 |
An architecture for exploiting multi-core processors to parallelize network intrusion prevention V Paxson, R Sommer, N Weaver 2007 IEEE Sarnoff Symposium, 1-7, 2007 | 103 | 2007 |
Rethinking Hardware Support for Network Analysis and Intrusion Prevention. V Paxson, K Asanovic, S Dharmapurikar, JW Lockwood, R Pang, ... HotSec, 2006 | 95 | 2006 |
Predicting the resource consumption of network intrusion detection systems H Dreger, A Feldmann, V Paxson, R Sommer ACM SIGMETRICS Performance Evaluation Review 36 (1), 437-438, 2008 | 90 | 2008 |
Enhancing the accuracy of network-based intrusion detection with host-based context H Dreger, C Kreibich, V Paxson, R Sommer International Conference on Detection of Intrusions and Malware, and …, 2005 | 83 | 2005 |