Follow
Christian J. Dietrich
Christian J. Dietrich
Westphalian University
Verified email at cj2s.de - Homepage
Title
Cited by
Cited by
Year
Manufacturing Compromise: The Emergence of Exploit-as-a-Service
C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ...
3012012
Prudent practices for designing malware experiments: Status quo and outlook
C Rossow, CJ Dietrich, C Grier, C Kreibich, V Paxson, N Pohlmann, ...
2012 IEEE Symposium on Security and Privacy, 65-79, 2012
2972012
Sok: P2Pwned - modeling and evaluating the resilience of peer-to-peer botnets
C Rossow, D Andriesse, T Werner, B Stone-Gross, D Plohmann, ...
Security and Privacy (SP), 2013 IEEE Symposium on, 97-111, 2013
2412013
P2PWNED: Modeling and Evaluating the Resilience of Peer-to-Peer Botnets
C Rossow, D Andriesse, T Werner, B Stone-Gross, D Plohmann, ...
241*
On Botnets that use DNS for Command and Control
CJ Dietrich, C Rossow, FC Freiling, H Bos, M Van Steen, N Pohlmann
2011 seventh european conference on computer network defense, 9-16, 2011
1832011
CoCoSpot: Clustering and Recognizing Botnet Command and Control Channels using Traffic Analysis
CJ Dietrich, C Rossow, N Pohlmann
Computer Networks, 2012
1362012
Sandnet: Network traffic analysis of malicious software
C Rossow, CJ Dietrich, H Bos, L Cavallaro, M van Steen, FC Freiling, ...
Proceedings of the First Workshop on Building Analysis Datasets and …, 2011
1302011
Large Scale Analysis of Malware Downloaders
C Rossow, C Dietrich, H Bos
7. GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit, 12, 2012
852012
Provex: Detecting botnets with encrypted command and control channels
C Rossow, CJ Dietrich
International Conference on Detection of Intrusions and Malware, and …, 2013
792013
Empirical research of IP blacklists
CJ Dietrich, C Rossow
ISSE 2008 Securing Electronic Business Processes, 163-171, 2009
532009
Empirical research on IP blacklisting
C Dietrich, C Rossow
CEAS’08: Proceedings of the Fifth Conference on Email and Anti-Spam, 2008
53*2008
Exploiting visual appearance to cluster and detect rogue software
CJ Dietrich, C Rossow, N Pohlmann
Proceedings of the 28th annual ACM symposium on applied computing, 1776-1783, 2013
232013
Hiding in Plain Sight
PM Bureau, C Dietrich
Black Hat, 2015
102015
Detecting Gray in Black and White
C Rossow, T Czerwinski, CJ Dietrich, N Pohlmann
MIT Spam Conference, 2010
82010
eID online authentication network threat model, attacks and implications
CJ Dietrich, C Rossow, N Pohlmann
19th DFN Workshop 2012, 2012
62012
Network Traffic Analysis of Malicious Software
C Rossow, C Dietrich, HJ Bos, L Cavallaro, MR van Steen, F Freiling, ...
Eurosys Workshops, 2011
12011
Detecting malicious bot-induced network traffic using machine learning
CJ Dietrich
SPRING-SIDAR Graduierten-Workshop über Reaktive Sicherheit, 7. Juli 2010 …, 2010
2010
Extended Access Control–neuer Zugriffsmechanismus für elektronische Ausweisdokumente
CJ Dietrich, N Pohlmann, FH Gelsenkirchen
Tagungsband zum 9. Kryptotag, 8, 2008
2008
Evaluation of the Possible Utilization of anti-spam Mechanisms Against spit
C Dietrich, M Hesse
ISSE/SECURE 2007: securing electronic business processes: highlights of the …, 2007
2007
E-Mail-Verlässlichkeit: Auswertung der Umfrage Ende 2004
C Dietrich, N Pohlmann
The system can't perform the operation now. Try again later.
Articles 1–20