Folgen
Amir Azodi
Amir Azodi
Hasso Plattner Insitute
Bestätigte E-Mail-Adresse bei azodi.me
Titel
Zitiert von
Zitiert von
Jahr
How to attack two-factor authentication internet banking
M Adham, A Azodi, Y Desmedt, I Karaolis
International Conference on Financial Cryptography and Data Security, 322-328, 2013
622013
Hierarchical object log format for normalisation of security events
A Sapegin, D Jaeger, A Azodi, M Gawron, F Cheng, C Meinel
2013 9th International Conference on Information Assurance and Security (IAS …, 2013
402013
A modular framework for multi-factor authentication and key exchange
N Fleischhacker, M Manulis, A Azodi
International Conference on Research in Security Standardisation, 190-214, 2014
362014
A new approach to building a multi-tier direct access knowledgebase for ids/siem systems
A Azodi, D Jaeger, F Cheng, C Meinel
2013 IEEE 11th International Conference on Dependable, Autonomic and Secure …, 2013
252013
Pushing the limits in event normalisation to improve attack detection in IDS/SIEM systems
A Azodi, D Jaeger, F Cheng, C Meinel
2013 International Conference on Advanced Cloud and Big Data, 69-76, 2013
232013
Normalizing security events with a hierarchical knowledge base
D Jaeger, A Azodi, F Cheng, C Meinel
IFIP International Conference on Information Security Theory and Practice …, 2015
162015
Modular Design and Analysis Framework for Multi-Factor Authentication and Key Exchange.
N Fleischhacker, M Manulis, A Azodi
IACR Cryptology ePrint Archive 2012, 181, 2012
102012
Towards better attack path visualizations based on deep normalization of host/network IDS alerts
A Azodi, F Cheng, C Meinel
2016 IEEE 30th International Conference on Advanced Information Networking …, 2016
82016
Security event correlation supported by multi-core architecture
F Cheng, A Azodi, D Jaeger, C Meinel
2013 International Conference on IT Convergence and Security (ICITCS), 1-5, 2013
82013
Event driven network topology discovery and inventory listing using reams
A Azodi, F Cheng, C Meinel
Wireless Personal Communications 94 (3), 415-430, 2017
72017
Normalisation of log messages for intrusion detection
A Sapegin, D Jaeger, A Azodi, M Gawron, F Cheng, C Meinel
J. Inf. Assur. Secur 9 (3), 167-176, 2014
42014
Multi-core Supported High Performance Security Analytics
F Cheng, A Azodi, D Jaeger, C Meinel
2013 IEEE 11th International Conference on Dependable, Autonomic and Secure …, 2013
42013
Beat your mom at solitaire—A review of reverse engineering techniques and countermeasures
C Matthies, L Pirl, A Azodi, C Meinel
2015 6th IEEE international conference on software engineering and service …, 2015
32015
Leveraging event structure for adaptive machine learning on big data landscapes
A Azodi, M Gawron, A Sapegin, F Cheng, C Meinel
International Conference on Mobile, Secure and Programmable Networking, 28-40, 2015
32015
Passive Network Monitoring using REAMS
A Azodi, D Jaeger, F Cheng, C Meinel
Information Science and Applications, 205-215, 2015
22015
Event Normalization Through Dynamic Log Format Detection
A Azodi, D Jaeger, F Cheng, C Meinel
ZTE Communications, 11, 2014
22014
Runtime Updatable and Dynamic Event Processing Using Embedded ECMAScript Engines
A Azodi, D Jaeger, F Cheng, C Meinel
2014 International Conference on IT Convergence and Security (ICITCS), 1-4, 2014
12014
HPI Future SOC Lab
K Kurbel, D Nowak, A Azodi, D Jaeger, C Meinel, F Cheng, A Sapegin, ...
2017
Generating A Unified Event Representation From Arbitrary Log Formats
A Azodi, D Jaeger, F Cheng, C Meinel
HPI Future SOC Lab: Proceedings 2013 88, 37, 2015
2015
Normalisation of Log Messages
A Sapegin, D Jaeger, A Azodi, F Cheng, C Meinel
HPI Future SOC Lab: Proceedings 2013 88, 121, 2015
2015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20