Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Neuhaus, Stephan"'
This white paper presents an analysis done by the MAMI project of the privacy and security concerns surrounding middlebox cooperation protocols (MCPs), based on our experimental experience with the Path Layer UDP Substrate (PLUS) proposal. Our key fi
Externí odkaz:
http://arxiv.org/abs/1812.05437
Autor:
Neuhaus, Stephan
Publikováno v:
Journal of Intellectual Property Law & Practice; Oct2023, Vol. 18 Issue 10, p743-748, 6p
Autor:
Graf, Hans Daniel, Koc, Yusuf, Panighetti, Sandro, Togni, Matteo, von Grünigen, Dirk, Weilenmann, Martin, Xhoxhaj, Erland, Zürrer, Daniel, Benites de Azevedo e Souza, Fernando, Deriu, Jan Milan, Neureiter, Nico, von Däniken, Pius, Cieliebak, Mark, Eich, Walter, Neuhaus, Stephan, Stockinger, Kurt
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______3760::5361e78e3c5b5a5ef3331a2ec07d8db9
https://hdl.handle.net/11475/10904
https://hdl.handle.net/11475/10904
This paper describes our approach for the Author Profiling Shared Task at PAN 2017. The goal was to classify the gender and language variety of a Twitter user solely by their tweets. Author Profiling can be applied in various fields like marketing, s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c098ace461a8ad739cb0225822365e7d
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Proceedings of the 2016 workshop on Applied Networking Research Workshop-ANRW 16
ANRW
ANRW
The Internet is full of middleboxes that change packets and flows. In fact, there is probably no IP or TCP header that is not affected by at least one middlebox. Obviously, middleboxes impede path transparency, i.e., the idea that an exchange of mess
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::66814b25d7c19515209da7efd949ea08
https://hdl.handle.net/11475/8732
https://hdl.handle.net/11475/8732
Autor:
Neuhaus, Stephan, Zimmermann, Thomas
We show in an empirical study of 3241 Red Hat packages that software vulnerabilities correlate with dependencies between packages. With formal concept analysis and statistical hypothesis testing, we identify dependencies that decrease the risk of vul
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______353::be0080e5fbb4831edc6124b3802c3a9a
http://eprints.biblio.unitn.it/1543/
http://eprints.biblio.unitn.it/1543/
Autor:
Neuhaus, Stephan
I propose a new method of analyzing intrusions: instead of analyzing evidence and deducing what must have happened, I find the intrusion-causing circumstances by a series of automatic experiments. I first capture process';s system calls, and when an
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4f4eef7b51a14ba65ef758b53148f3c9
Autor:
Neuhaus, Stephan
When dealing with malware infections, one of the first tasks is to find the processes that were involved in the attack. We introduce Malfor, a system that isolates those processes automatically. In contrast to other methods that help analyze attacks,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b92005f7691677ff536e5a4127efc2a3
Autor:
Distl, Bernhard, Neuhaus, Stephan
Publikováno v:
2015 7th International Conference on Communication Systems & Networks (COMSNETS); 2015, p1-8, 8p