Mathias Fischer
Mathias Fischer
Universität Hamburg
Verified email at ieee.org - Homepage
TitleCited byYear
Taxonomy and Survey of Collaborative Intrusion Detection
E Vasilomanolakis, S Karuppayah, M Mühlhäuser, M Fischer
ACM Computing Surveys (CSUR) 47 (4), 55, 2015
1572015
A distributed IP mobility approach for 3G SAE
M Fischer, FU Andersen, A Koepsel, G Schaefer, M Schlaeger
Personal, Indoor and Mobile Radio Communications, 2008. PIMRC 2008. IEEE …, 2008
442008
SkipMon: A Locality-Aware Collaborative Intrusion Detection System
E Vasilomanolakis, M Kr, CG Cordero, M Max, M Fischer
2015 IEEE 34th International Performance Computing and Communications …, 2015
182015
On Advanced Monitoring in Resilient and Unstructured P2P Botnets
S Karuppayah, M Fischer, C Rossow, M Mühlhäuser
International Conference on Communications (ICC) - Communications and …, 2014
172014
Analyzing flow-based anomaly intrusion detection using replicator neural networks
CG Cordero, S Hauke, M Mühlhäuser, M Fischer
2016 14th Annual Conference on Privacy, Security and Trust (PST), 317-324, 2016
162016
AnonPubSub: Anonymous publish-subscribe overlays
J Daubert, M Fischer, T Grube, S Schiffner, P Kikiras, M Mühlhäuser
Computer Communications 76, 42-53, 2016
162016
On the resilience of P2P-based botnet graphs
S Haas, S Karuppayah, S Manickam, M Mühlhäuser, M Fischer
2016 IEEE Conference on Communications and Network Security (CNS), 225-233, 2016
132016
This network is infected: HosTaGe-a low-interaction honeypot for mobile devices
E Vasilomanolakis, S Karuppayah, M Fischer, M Mühlhäuser, ...
Proceedings of the Third ACM workshop on Security and privacy in smartphones …, 2013
132013
On complexity and approximability of optimal dos attacks on multiple-tree p2p streaming topologies
S Grau, M Fischer, M Brinkmeier, G Schaefer
IEEE Transactions on Dependable and Secure Computing 8 (2), 270-281, 2010
132010
Methods for improving resilience in communication networks and P2P overlays
M Brinkmeier, M Fischer, S Grau, G Schäfer, T Strufe
PIK-Praxis der Informationsverarbeitung und Kommunikation 32 (1), 64-78, 2009
132009
Towards the design of unexploitable construction mechanisms for multiple-tree based P2P streaming systems
M Brinkmeier, M Fischer, S Grau, G Schaefer
Kommunikation in Verteilten Systemen (KiVS), 193-204, 2009
132009
Hide and seek: detecting sensors in P2P botnets
L Böck, S Karuppayah, T Grube, M Mühlhäuser, M Fischer
2015 IEEE Conference on Communications and Network Security (CNS), 731-732, 2015
112015
Zeus Milker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism
S Karuppayah, S Roos, C Rossow, M Mühlhäuser, M Fischer
2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015
112015
Tracking Users across the Web via TLS Session Resumption
E Sy, C Burkert, H Federrath, M Fischer
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
102018
Distributed and anonymous publish-subscribe
J Daubert, M Fischer, S Schiffner, M Mühlhäuser
International Conference on Network and System Security, 685-691, 2013
102013
Twitterize: Anonymous Micro-Blogging
J Daubert, L Böck, P Kikirasy, M Mühlhäuser, M Fischer
2014 IEEE/ACS 11th International Conference on Computer Systems and …, 2014
92014
HosTaGe: a Mobile Honeypot for Collaborative Defense
E Vasilomanolakis, S Karuppayah, M Mühlhäuser, M Fischer
Proceedings of the 7th International Conference on Security of Information …, 2014
92014
OSSim: a generic simulation framework for overlay streaming
G Nguyen, M Fischer, T Strufe
Proceedings of the 2013 Summer Computer Simulation Conference, 30, 2013
92013
BoobyTrap: On autonomously detecting and characterizing crawlers in P2P botnets
S Karuppayah, E Vasilomanolakis, S Haas, M Mühlhäuser, M Fischer
2016 IEEE International Conference on Communications (ICC), 1-7, 2016
72016
Internal attacks in anonymous publish-subscribe P2P overlays
J Daubert, T Grube, M Muhlhauser, M Fischer
Networked Systems (NetSys), 2015 International Conference and Workshops on, 1-8, 2015
72015
The system can't perform the operation now. Try again later.
Articles 1–20