Advanced persistent threats: Behind the scenes M Ussath, D Jaeger, F Cheng, C Meinel 2016 Annual Conference on Information Science and Systems (CISS), 181-186, 2016 | 162 | 2016 |
Hierarchical object log format for normalisation of security events A Sapegin, D Jaeger, A Azodi, M Gawron, F Cheng, C Meinel 2013 9th international conference on information assurance and security (IAS …, 2013 | 41 | 2013 |
Identifying suspicious user behavior with neural networks M Ussath, D Jaeger, F Cheng, C Meinel 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing …, 2017 | 34 | 2017 |
Towards a system for complex analysis of security events in large-scale networks A Sapegin, D Jaeger, F Cheng, C Meinel Computers & Security 67, 16-34, 2017 | 30 | 2017 |
Analysis of publicly leaked credentials and the long story of password (re-) use D Jaeger, C Pelchen, H Graupner, F Cheng, C Meinel Hasso Plattner Institute, Universidad de Potsdam. Disponible en https://bit …, 2016 | 26 | 2016 |
A new approach to building a multi-tier direct access knowledgebase for IDS/SIEM systems A Azodi, D Jaeger, F Cheng, C Meinel 2013 IEEE 11th International Conference on Dependable, Autonomic and Secure …, 2013 | 26 | 2013 |
Multi-step attack pattern detection on normalized event logs D Jaeger, M Ussath, F Cheng, C Meinel 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015 | 25 | 2015 |
Pushing the limits of cyber threat intelligence: extending STIX to support complex patterns M Ussath, D Jaeger, F Cheng, C Meinel Information Technology: New Generations: 13th International Conference on …, 2016 | 24 | 2016 |
Gathering and analyzing identity leaks for security awareness D Jaeger, H Graupner, A Sapegin, F Cheng, C Meinel Technology and Practice of Passwords: International Conference on Passwords …, 2015 | 23 | 2015 |
Pushing the limits in event normalisation to improve attack detection in IDS/SIEM systems A Azodi, D Jaeger, F Cheng, C Meinel 2013 international conference on advanced cloud and big data, 69-76, 2013 | 23 | 2013 |
Normalizing security events with a hierarchical knowledge base D Jaeger, A Azodi, F Cheng, C Meinel Information Security Theory and Practice: 9th IFIP WG 11.2 International …, 2015 | 17 | 2015 |
Automated parsing and interpretation of identity leaks H Graupner, D Jaeger, F Cheng, C Meinel Proceedings of the ACM International Conference on Computing Frontiers, 127-134, 2016 | 13 | 2016 |
Parallel and distributed normalization of security events for instant attack analysis D Jaeger, A Sapegin, M Ussath, F Cheng, C Meinel 2015 IEEE 34th international performance computing and communications …, 2015 | 10 | 2015 |
Evaluation of in‐memory storage engine for machine learning analysis of security events A Sapegin, M Gawron, D Jaeger, F Cheng, C Meinel Concurrency and Computation: Practice and Experience 29 (2), e3800, 2017 | 9 | 2017 |
High-speed security analytics powered by in-memory machine learning engine A Sapegin, M Gawron, D Jaeger, F Cheng, C Meinel 2015 14th International Symposium on Parallel and Distributed Computing, 74-81, 2015 | 9 | 2015 |
Security event correlation supported by multi-core architecture F Cheng, A Azodi, D Jaeger, C Meinel 2013 International Conference on IT Convergence and Security (ICITCS), 1-5, 2013 | 8 | 2013 |
The (persistent) threat of weak passwords: Implementation of a semi-automatic password-cracking algorithm C Pelchen, D Jaeger, F Cheng, C Meinel Information Security Practice and Experience: 15th International Conference …, 2019 | 6 | 2019 |
Xen episode iv: The guests still strike back D Jaeger, KF Krentz, M Richly, C Willems, W Dawoud, I Takouna Cloud Computing Security Summer Term, 1-15, 2011 | 6 | 2011 |
Accelerating event processing for security analytics on a distributed in-memory platform D Jaeger, F Cheng, C Meinel 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th …, 2018 | 5 | 2018 |
Fast Automated Processing and Evaluation of Identity Leaks D Jaeger, H Graupner, C Pelchen, F Cheng, C Meinel International Journal of Parallel Programming 46, 441-470, 2018 | 5 | 2018 |