How to attack two-factor authentication internet banking M Adham, A Azodi, Y Desmedt, I Karaolis International Conference on Financial Cryptography and Data Security, 322-328, 2013 | 63 | 2013 |
Hierarchical object log format for normalisation of security events A Sapegin, D Jaeger, A Azodi, M Gawron, F Cheng, C Meinel 2013 9th International Conference on Information Assurance and Security (IAS …, 2013 | 41 | 2013 |
A modular framework for multi-factor authentication and key exchange N Fleischhacker, M Manulis, A Azodi International Conference on Research in Security Standardisation, 190-214, 2014 | 37 | 2014 |
A new approach to building a multi-tier direct access knowledgebase for ids/siem systems A Azodi, D Jaeger, F Cheng, C Meinel 2013 IEEE 11th International Conference on Dependable, Autonomic and Secure …, 2013 | 26 | 2013 |
Pushing the limits in event normalisation to improve attack detection in IDS/SIEM systems A Azodi, D Jaeger, F Cheng, C Meinel 2013 International Conference on Advanced Cloud and Big Data, 69-76, 2013 | 23 | 2013 |
Normalizing security events with a hierarchical knowledge base D Jaeger, A Azodi, F Cheng, C Meinel IFIP International Conference on Information Security Theory and Practice …, 2015 | 17 | 2015 |
Modular Design and Analysis Framework for Multi-Factor Authentication and Key Exchange. N Fleischhacker, M Manulis, A Azodi IACR Cryptology ePrint Archive 2012, 181, 2012 | 10 | 2012 |
Towards better attack path visualizations based on deep normalization of host/network IDS alerts A Azodi, F Cheng, C Meinel 2016 IEEE 30th International Conference on Advanced Information Networking …, 2016 | 8 | 2016 |
Security event correlation supported by multi-core architecture F Cheng, A Azodi, D Jaeger, C Meinel 2013 International Conference on IT Convergence and Security (ICITCS), 1-5, 2013 | 8 | 2013 |
Event driven network topology discovery and inventory listing using reams A Azodi, F Cheng, C Meinel Wireless Personal Communications 94 (3), 415-430, 2017 | 7 | 2017 |
Normalisation of log messages for intrusion detection A Sapegin, D Jaeger, A Azodi, M Gawron, F Cheng, C Meinel J. Inf. Assur. Secur 9 (3), 167-176, 2014 | 4 | 2014 |
Multi-core Supported High Performance Security Analytics F Cheng, A Azodi, D Jaeger, C Meinel 2013 IEEE 11th International Conference on Dependable, Autonomic and Secure …, 2013 | 4 | 2013 |
Beat your mom at solitaire—A review of reverse engineering techniques and countermeasures C Matthies, L Pirl, A Azodi, C Meinel 2015 6th IEEE international conference on software engineering and service …, 2015 | 3 | 2015 |
Leveraging event structure for adaptive machine learning on big data landscapes A Azodi, M Gawron, A Sapegin, F Cheng, C Meinel International Conference on Mobile, Secure and Programmable Networking, 28-40, 2015 | 3 | 2015 |
Passive Network Monitoring using REAMS A Azodi, D Jaeger, F Cheng, C Meinel Information Science and Applications, 205-215, 2015 | 2 | 2015 |
Event Normalization Through Dynamic Log Format Detection A Azodi, D Jaeger, F Cheng, C Meinel ZTE Communications, 11, 2014 | 2 | 2014 |
Runtime Updatable and Dynamic Event Processing Using Embedded ECMAScript Engines A Azodi, D Jaeger, F Cheng, C Meinel 2014 International Conference on IT Convergence and Security (ICITCS), 1-4, 2014 | 1 | 2014 |
HPI Future SOC Lab K Kurbel, D Nowak, A Azodi, D Jaeger, C Meinel, F Cheng, A Sapegin, ... | | 2017 |
Generating A Unified Event Representation From Arbitrary Log Formats A Azodi, D Jaeger, F Cheng, C Meinel HPI Future SOC Lab: Proceedings 2013 88, 37, 2015 | | 2015 |
Normalisation of Log Messages A Sapegin, D Jaeger, A Azodi, F Cheng, C Meinel HPI Future SOC Lab: Proceedings 2013 88, 121, 2015 | | 2015 |