Mathias Fischer
Mathias Fischer
Universität Hamburg
Verified email at - Homepage
Cited by
Cited by
Taxonomy and survey of collaborative intrusion detection
E Vasilomanolakis, S Karuppayah, M Mühlhäuser, M Fischer
ACM Computing Surveys (CSUR) 47 (4), 1-33, 2015
Analyzing flow-based anomaly intrusion detection using replicator neural networks
CG Cordero, S Hauke, M Mühlhäuser, M Fischer
2016 14th Annual Conference on Privacy, Security and Trust (PST), 317-324, 2016
A distributed IP mobility approach for 3G SAE
M Fischer, FU Andersen, A Koepsel, G Schaefer, M Schlaeger
Personal, Indoor and Mobile Radio Communications, 2008. PIMRC 2008. IEEE …, 2008
GAC: graph-based alert correlation for the detection of distributed multi-step attacks
S Haas, M Fischer
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 979-988, 2018
Tracking Users across the Web via TLS Session Resumption
E Sy, C Burkert, H Federrath, M Fischer
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
On Advanced Monitoring in Resilient and Unstructured P2P Botnets
S Karuppayah, M Fischer, C Rossow, M Mühlhäuser
International Conference on Communications (ICC) - Communications and …, 2014
SkipMon: A Locality-Aware Collaborative Intrusion Detection System
E Vasilomanolakis, M Kr, CG Cordero, M Max, M Fischer
2015 IEEE 34th International Performance Computing and Communications …, 2015
AnonPubSub: Anonymous publish-subscribe overlays
J Daubert, M Fischer, T Grube, S Schiffner, P Kikiras, M Mühlhäuser
Computer Communications 76, 42-53, 2016
Hostage: a mobile honeypot for collaborative defense
E Vasilomanolakis, S Karuppayah, M Mühlhäuser, M Fischer
Proceedings of the 7th International Conference on Security of Information …, 2014
Zeek-Osquery: Host-Network Correlation for Advanced Monitoring and Intrusion Detection
S Haas, R Sommer, M Fischer
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2020
On the resilience of P2P-based botnet graphs
S Haas, S Karuppayah, S Manickam, M Mühlhäuser, M Fischer
2016 IEEE Conference on Communications and Network Security (CNS), 225-233, 2016
Zeus Milker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism
S Karuppayah, S Roos, C Rossow, M Mühlhäuser, M Fischer
2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015
This network is infected: HosTaGe-a low-interaction honeypot for mobile devices
E Vasilomanolakis, S Karuppayah, M Fischer, M Mühlhäuser, ...
Proceedings of the Third ACM workshop on Security and privacy in smartphones …, 2013
Methods for improving resilience in communication networks and P2P overlays
M Brinkmeier, M Fischer, S Grau, G Schäfer, T Strufe
PIK-Praxis der Informationsverarbeitung und Kommunikation 32 (1), 64-78, 2009
Towards the design of unexploitable construction mechanisms for multiple-tree based P2P streaming systems
M Brinkmeier, M Fischer, S Grau, G Schaefer
Kommunikation in Verteilten Systemen (KiVS), 193-204, 2009
Twitterize: Anonymous Micro-Blogging
J Daubert, L Böck, P Kikirasy, M Mühlhäuser, M Fischer
2014 IEEE/ACS 11th International Conference on Computer Systems and …, 2014
A QUIC Look at Web Tracking
E Sy, C Burkert, H Federrath, M Fischer
Proceedings on Privacy Enhancing Technologies 2019 (3), 255-266, 2019
On the alert correlation process for the detection of multi-step attacks and a graph-based realization
S Haas, M Fischer
ACM SIGAPP Applied Computing Review 19 (1), 5-19, 2019
A memory-deduplication side-channel attack to detect applications in co-resident virtual machines
J Lindemann, M Fischer
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 183-192, 2018
BoobyTrap: On autonomously detecting and characterizing crawlers in P2P botnets
S Karuppayah, E Vasilomanolakis, S Haas, M Mühlhäuser, M Fischer
2016 IEEE International Conference on Communications (ICC), 1-7, 2016
The system can't perform the operation now. Try again later.
Articles 1–20