default search action
Robin Sommer
Person information
- affiliation: International Computer Science Institute (ICSI)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [i5]Jan Grashöfer, Peter Oettig, Robin Sommer, Tim Wojtulewicz, Hannes Hartenstein:
Advancing Protocol Diversity in Network Security Monitoring. CoRR abs/2106.12454 (2021) - 2020
- [c42]Steffen Haas, Robin Sommer, Mathias Fischer:
Zeek-Osquery: Host-Network Correlation for Advanced Monitoring and Intrusion Detection. SEC 2020: 248-262 - [i4]Steffen Haas, Robin Sommer, Mathias Fischer:
zeek-osquery: Host-Network Correlation for Advanced Monitoring and Intrusion Detection. CoRR abs/2002.04547 (2020)
2010 – 2019
- 2018
- [i3]Jaeyoung Choi, Istemi Ekin Akkus, Serge Egelman, Gerald Friedland, Robin Sommer, Michael Carl Tschantz, Nicholas Weaver:
Cybercasing 2.0: You Get What You Pay For. CoRR abs/1811.06584 (2018) - 2017
- [c41]Johanna Amann, Robin Sommer:
Viable Protection of High-Performance Networks through Hardware/Software Co-Design. SDN-NFV@CODASPY 2017: 19-24 - 2016
- [c40]Robin Sommer, Johanna Amann, Seth Hall:
Spicy: a unified deep packet inspection framework for safely dissecting all your data. ACSAC 2016: 558-569 - [c39]Matthias Vallentin, Vern Paxson, Robin Sommer:
VAST: A Unified Platform for Interactive Network Forensics. NSDI 2016: 345-362 - [c38]Johanna Amann, Robin Sommer:
Exploring Tor's Activity Through Long-Term Passive TLS Traffic Measurement. PAM 2016: 3-15 - [c37]Marco Caselli, Emmanuele Zambon, Johanna Amann, Robin Sommer, Frank Kargl:
Specification Mining for Intrusion Detection in Networked Control Systems. USENIX Security Symposium 2016: 791-806 - 2015
- [c36]Oana Goga, Patrick Loiseau, Robin Sommer, Renata Teixeira, Krishna P. Gummadi:
On the Reliability of Profile Matching Across Large Online Social Networks. KDD 2015: 1799-1808 - [c35]Johanna Amann, Robin Sommer:
Providing Dynamic Control to Passive Network Security Monitoring. RAID 2015: 133-152 - [p1]Gerald Friedland, Adam Janin, Howard Lei, Jaeyoung Choi, Robin Sommer:
Content-Based Privacy for Consumer-Produced Multimedia. Multimedia Data Mining and Analytics 2015: 157-173 - [i2]Oana Goga, Patrick Loiseau, Robin Sommer, Renata Teixeira, Krishna P. Gummadi:
On the Reliability of Profile Matching Across Large Online Social Networks. CoRR abs/1506.02289 (2015) - [i1]Johanna Amann, Robin Sommer, Matthias Vallentin, Seth Hall:
To Trust, or not to Trust, that is the Question: Structural Properties of X.509 Certificates. Tiny Trans. Comput. Sci. 3 (2015) - 2014
- [c34]Dina Hadziosmanovic, Robin Sommer, Emmanuele Zambon, Pieter H. Hartel:
Through the eye of the PLC: semantic security monitoring for industrial processes. ACSAC 2014: 126-135 - [c33]Lorenzo De Carli, Robin Sommer, Somesh Jha:
Beyond Pattern Matching: A Concurrency Model for Stateful Deep Packet Inspection. CCS 2014: 1378-1390 - [c32]Robin Sommer, Matthias Vallentin, Lorenzo De Carli, Vern Paxson:
HILTI: an Abstract Execution Environment for Deep, Stateful Network Traffic Analysis. Internet Measurement Conference 2014: 461-474 - [c31]Johanna Amann, Seth Hall, Robin Sommer:
Count Me In: Viable Distributed Summary Statistics for Securing High-Speed Networks. RAID 2014: 320-340 - 2013
- [c30]B. Amann, Robin Sommer, Matthias Vallentin, Seth Hall:
No attack necessary: the surprising dynamics of SSL trust relationships. ACSAC 2013: 179-188 - [c29]Devdatta Akhawe, B. Amann, Matthias Vallentin, Robin Sommer:
Here's my cert, so trust me, maybe?: understanding TLS errors on the web. WWW 2013: 59-70 - [c28]Oana Goga, Howard Lei, Sree Hari Krishnan Parthasarathi, Gerald Friedland, Robin Sommer, Renata Teixeira:
Exploiting innocuous activity for correlating users across sites. WWW 2013: 447-458 - 2012
- [c27]Nadi Sarrar, Gregor Maier, Bernhard Ager, Robin Sommer, Steve Uhlig:
Investigating IPv6 Traffic - What Happened at the World IPv6 Day? PAM 2012: 11-20 - [c26]B. Amann, Robin Sommer, Aashish Sharma, Seth Hall:
A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence. RAID 2012: 314-333 - 2011
- [c25]Gregor Maier, Anja Feldmann, Vern Paxson, Robin Sommer, Matthias Vallentin:
An Assessment of Overt Malicious Activity Manifest in Residential Networks. DIMVA 2011: 144-163 - [c24]Gerald Friedland, Gregor Maier, Robin Sommer, Nicholas Weaver:
Sherlock holmes' evil twin: on the impact of global inference for online privacy. NSPW 2011: 105-114 - [e3]Robin Sommer, Davide Balzarotti, Gregor Maier:
Recent Advances in Intrusion Detection - 14th International Symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings. Lecture Notes in Computer Science 6961, Springer 2011, ISBN 978-3-642-23643-3 [contents] - 2010
- [c23]Robin Sommer, Vern Paxson:
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. IEEE Symposium on Security and Privacy 2010: 305-316 - [c22]Gerald Friedland, Robin Sommer:
Cybercasing the Joint: On the Privacy Implications of Geo-Tagging. HotSec 2010 - [e2]Somesh Jha, Robin Sommer, Christian Kreibich:
Recent Advances in Intrusion Detection, 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings. Lecture Notes in Computer Science 6307, Springer 2010, ISBN 978-3-642-15511-6 [contents]
2000 – 2009
- 2009
- [j1]Robin Sommer, Vern Paxson, Nicholas Weaver:
An architecture for exploiting multi-core processors to parallelize network intrusion prevention. Concurr. Comput. Pract. Exp. 21(10): 1255-1279 (2009) - [c21]Prateek Mittal, Vern Paxson, Robin Sommer, Mark Winterrowd:
Securing Mediated Trace Access Using Black-box Permutation Analysis. HotNets 2009 - [c20]Nicholas Weaver, Robin Sommer, Vern Paxson:
Detecting Forged TCP Reset Packets. NDSS 2009 - 2008
- [c19]Holger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer:
Predicting the Resource Consumption of Network Intrusion Detection Systems. RAID 2008: 135-154 - [c18]Gregor Maier, Robin Sommer, Holger Dreger, Anja Feldmann, Vern Paxson, Fabian Schneider:
Enriching network security analysis with time travel. SIGCOMM 2008: 183-194 - [c17]Holger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer:
Predicting the resource consumption of network intrusion detection systems. SIGMETRICS 2008: 437-438 - [c16]Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver:
Principles for Developing Comprehensive Network Visibility. HotSec 2008 - 2007
- [c15]Matthias Vallentin, Robin Sommer, Jason Lee, Craig Leres, Vern Paxson, Brian Tierney:
The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. RAID 2007: 107-126 - [c14]Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver:
The Strengths of Weaker Identities: Opportunistic Personas. HotSec 2007 - [c13]Nicholas Weaver, Robin Sommer:
Stress Testing Cluster Bro. DETER 2007 - [e1]Bernhard M. Hämmerli, Robin Sommer:
Detection of Intrusions and Malware, and Vulnerability Assessment, 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007, Proceedings. Lecture Notes in Computer Science 4579, Springer 2007, ISBN 978-3-540-73613-4 [contents] - 2006
- [c12]Ruoming Pang, Vern Paxson, Robin Sommer, Larry L. Peterson:
binpac: a yacc for writing application protocol parsers. Internet Measurement Conference 2006: 289-300 - [c11]Nicholas Weaver, Vern Paxson, Robin Sommer:
Work in Progress: Bro-LAN Pervasive Network Inspection and Control for LAN Traffic. SecureComm 2006: 1-2 - [c10]Vern Paxson, Krste Asanovic, Sarang Dharmapurikar, John W. Lockwood, Ruoming Pang, Robin Sommer, Nicholas Weaver:
Rethinking Hardware Support for Network Analysis and Intrusion Prevention. HotSec 2006 - 2005
- [b1]Robin Sommer:
Viable network intrusion detection in high-performance environments. Technical University Munich, Germany, 2005, pp. 1-163 - [c9]Robin Sommer, Vern Paxson:
Exploiting Independent State For Network Intrusion Detection. ACSAC 2005: 59-71 - [c8]Holger Dreger, Christian Kreibich, Vern Paxson, Robin Sommer:
Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context. DIMVA 2005: 206-221 - [c7]Christian Kreibich, Robin Sommer:
Policy-Controlled Event Management for Distributed Intrusion Detection. ICDCS Workshops 2005: 385-391 - [c6]Stefan Kornexl, Vern Paxson, Holger Dreger, Anja Feldmann, Robin Sommer:
Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic. Internet Measurement Conference 2005: 267-272 - 2004
- [c5]Holger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer:
Operational experiences with high-volume network intrusion detection. CCS 2004: 2-11 - [c4]Andy Rupp, Holger Dreger, Anja Feldmann, Robin Sommer:
Packet trace manipulation rramework for test labs. Internet Measurement Conference 2004: 251-256 - 2003
- [c3]Robin Sommer, Vern Paxson:
Enhancing byte-level network intrusion detection signatures with context. CCS 2003: 262-271 - [c2]Robin Sommer:
Bro: An Open Source Network Intrusion Detection System. DFN-Arbeitstagung über Kommunikationsnetze 2003: 273-288 - 2002
- [c1]Robin Sommer, Anja Feldmann:
NetFlow: information loss or win? Internet Measurement Workshop 2002: 173-174
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint