Publications
Found 50 results
Author [ Title] Type Year Filters: First Letter Of Last Name is S and Author is Robin Sommer [Clear All Filters]
Viable Protection of High-Performance Networks through Hardware/Software Co-Design.
Proceedings of ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization.
(2017). VAST: A Unified Platform for Interactive Network Forensics.
Proceedings of USENIX Sympyosium on Networked Systems Design and Implementation.
(2016).
(2013).
Stress Testing Cluster Bro.
Proceedings of USENiX DETER Community Workshop on Cyber Security Experimentation and Test (DETER 2007).
(2007). The Strengths of Weaker Identities: Opportunistic Personas.
Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
(2007). Spicy: A Unified Deep Packet Inspection Framework for Safely Dissecting All Your Data.
Proceedings of 2016 Annual Computer Security Applications Conference.
(2016). Spicy: A Unified Deep Packet Inspection Framework Dissecting All Your Data.
ICSI Technical Report.
(2015). Specification Mining for Intrusion Detection in Networked Control Systems.
Proceedings of the 25th USENIX Security Symposium. 790-806.
(2016).
(2011).
(2009).
(2012).
Rethinking Hardware Support for Network Analysis and Intrusion Prevention.
Proceedings of the First USENIX Workshop on Hot Topics in Security (HotSec '06).
(2006). Providing Dynamic Control to Passive Network Security Monitoring.
Proceedings of 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
(2015). Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010), Ottawa, Canada.
(Jha, S., Sommer R., & Kreibich C., Ed.).
(2010).
(2008).
(2008). Policy-Controlled Event Management for Distributed Intrusion Detection.
Proceedings of the Fourth International Workshop on Distributed Event-Based Systems (DEBS) (ICDCSW'05). 4, 385-391.
(2005).
(2010).
Operational Experiences with High-Volume Network Intrusion Detection.
Proceedings of the 11th ACM Conference on Computer Communications Security (CCS 2004). 11, 2.
(2004).
(2013).
The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware.
Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2007).
(2007).
(2012).
(2013).
(2010).
(2014).