Sven Dietrich
Sven Dietrich
Professor of Computer Science, Hunter College & The Graduate Center, CUNY
Verified email at - Homepage
Cited by
Cited by
Internet denial of service: attack and defense mechanisms (Radia Perlman Computer Networking and Security)
J Mirkovic, S Dietrich, D Dittrich, P Reiher
Prentice Hall PTR, 2004
Analyzing distributed denial of service tools: The shaft case
S Dietrich, N Long
14th Systems Administration Conference (LISA 2000), 2000
Analysis of the Storm and Nugache Trojans: P2P is here
S Stover, D Dittrich, J Hernandez, S Dietrich
USENIX; login 32 (6), 18-27, 2007
P2P as botnet command and control: a deeper insight
D Dittrich, S Dietrich
2008 3rd International Conference on Malicious and Unwanted Software …, 2008
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts
B Coskun, S Dietrich, N Memon
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
Security challenges and opportunities of software-defined networking
MC Dacier, H König, R Cwalinski, F Kargl, S Dietrich
IEEE Security & Privacy 15 (2), 96-100, 2017
The mstream distributed denial of service attack tool
D Dittrich, G Weaver, S Dietrich, N Long
University of Washington, http://staff. washington. edu/dittrich/misc …, 2000
Detecting zero-day attacks using context-aware anomaly detection at the application-layer
P Duessel, C Gehl, U Flegel, S Dietrich, M Meier
International Journal of Information Security 16 (5), 475-490, 2017
{SkyNET}: A {3G-Enabled} Mobile Attack Drone and Stealth Botmaster
T Reed, J Geis, S Dietrich
5th USENIX Workshop on Offensive Technologies (WOOT 11), 2011
Financial Cryptography and Data Security: FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers
R Sion, R Curtmola, S Dietrich, A Kiayias, JM Miret, K Sako, F Sebé
Springer Science & Business Media, 2010
Building an active computer security ethics community
D Dittrich, M Bailey, S Dietrich
IEEE Security & Privacy 9 (4), 32-40, 2010
Discovery techniques for P2P botnets
D Dittrich, S Dietrich
Stevens Institute of Technology CS Technical Report 4 (26), 2, 2008
Towards community standards for ethical behavior in computer security research
D Dittrich, M Bailey, S Dietrich
University of Washington, Michael Bailey, University of Michigan, Sven …, 2009
An Analysis of the” shaft” distributed denial of service tool
S Dietrich, N Long, D Dittrich
Proceedings of LISA 2000, 2000
{V0Finder}: Discovering the Correct Origin of Publicly Reported Software Vulnerabilities
S Woo, D Lee, S Park, H Lee, S Dietrich
30th USENIX Security Symposium (USENIX Security 21), 3041-3058, 2021
Command and control structures in malware
D Dittrich, S Dietrich
Usenix magazine 32 (6), 2007
New directions in peer-to-peer malware
D Dittrich, S Dietrich
2008 IEEE Sarnoff Symposium, 1-5, 2008
A secure submission system for online whistleblowing platforms
V Roth, B Güldenring, E Rieffel, S Dietrich, L Ries
Financial Cryptography and Data Security: 17th International Conference, FC …, 2013
A formal analysis of the secure sockets layer protocol
S Dietrich
PhDthesis, Dept. Mathematics andComputerScience, Adelphi University, April1997, 1997
Riding the IoT wave with VFuzz: discovering security flaws in smart homes
CK Nkuba, S Kim, S Dietrich, H Lee
IEEE Access 10, 1775-1789, 2021
The system can't perform the operation now. Try again later.
Articles 1–20