Christian J. Dietrich
Christian J. Dietrich
Westphalian University
Verified email at cj2s.de - Homepage
TitleCited byYear
Manufacturing Compromise: The Emergence of Exploit-as-a-Service
C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ...
2332012
Sok: P2Pwned - modeling and evaluating the resilience of peer-to-peer botnets
C Rossow, D Andriesse, T Werner, B Stone-Gross, D Plohmann, ...
Security and Privacy (SP), 2013 IEEE Symposium on, 97-111, 2013
1722013
Prudent practices for designing malware experiments: Status quo and outlook
C Rossow, CJ Dietrich, C Grier, C Kreibich, V Paxson, N Pohlmann, ...
Security and Privacy (SP), 2012 IEEE Symposium on, 65-79, 2012
1722012
P2PWNED: Modeling and Evaluating the Resilience of Peer-to-Peer Botnets
C Rossow, D Andriesse, T Werner, B Stone-Gross, D Plohmann, ...
172*
On Botnets that use DNS for Command and Control
CJ Dietrich, C Rossow, FC Freiling, H Bos, M Van Steen, N Pohlmann
2011 seventh european conference on computer network defense, 9-16, 2011
1052011
Sandnet: Network traffic analysis of malicious software
C Rossow, CJ Dietrich, H Bos, L Cavallaro, M van Steen, FC Freiling, ...
Proceedings of the First Workshop on Building Analysis Datasets and …, 2011
1042011
CoCoSpot: Clustering and Recognizing Botnet Command and Control Channels using Traffic Analysis
CJ Dietrich, C Rossow, N Pohlmann
Computer Networks, 2012
802012
Provex: Detecting botnets with encrypted command and control channels
C Rossow, CJ Dietrich
International Conference on Detection of Intrusions and Malware, and …, 2013
562013
Large Scale Analysis of Malware Downloaders
C Rossow, C Dietrich, H Bos
7. GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit, 12, 2012
512012
Empirical research on IP blacklisting
C Dietrich, C Rossow
CEAS’08: Proceedings of the Fifth Conference on Email and Anti-Spam, 2008
38*2008
Empirical research of IP blacklists
CJ Dietrich, C Rossow
ISSE 2008 Securing Electronic Business Processes, 163-171, 2009
202009
Exploiting visual appearance to cluster and detect rogue software
CJ Dietrich, C Rossow, N Pohlmann
Proceedings of the 28th annual ACM symposium on applied computing, 1776-1783, 2013
162013
eID online authentication network threat model, attacks and implications
CJ Dietrich, C Rossow, N Pohlmann
19th DFN Workshop 2012, 2012
52012
Detecting Gray in Black and White
C Rossow, T Czerwinski, CJ Dietrich, N Pohlmann
MIT Spam Conference, 2010
42010
Detecting malicious bot-induced network traffic using machine learning
CJ Dietrich
5. GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit, 9, 2010
2010
Extended Access Control–neuer Zugriffsmechanismus für elektronische Ausweisdokumente
CJ Dietrich, N Pohlmann, FH Gelsenkirchen
Tagungsband zum 9. Kryptotag, 8, 2008
2008
Evaluation of the Possible Utilization of anti-spam Mechanisms Against spit
C Dietrich, M Hesse
ISSE/SECURE 2007: securing electronic business processes: highlights of the …, 2007
2007
E-Mail-Verlässlichkeit: Auswertung der Umfrage Ende 2004
C Dietrich, N Pohlmann
Analyzing TLS-RSA-PSK cipher suites for eID Online Authentication
CJ Dietrich, C Rossow
14. Krypto-Tag, 5, 0
Botnets–Literature Survey and Report
C Rossow, CJ Dietrich, N Pohlmann
The system can't perform the operation now. Try again later.
Articles 1–20