Follow
Robin Sommer
Robin Sommer
Corelight
Verified email at icsi.berkeley.edu - Homepage
Title
Cited by
Cited by
Year
Outside the closed world: On using machine learning for network intrusion detection
R Sommer, V Paxson
2010 IEEE symposium on security and privacy, 305-316, 2010
19242010
Enhancing byte-level network intrusion detection signatures with context
R Sommer, V Paxson
Proceedings of the 10th ACM conference on Computer and communications …, 2003
4172003
Exploiting innocuous activity for correlating users across sites
O Goga, H Lei, SHK Parthasarathi, G Friedland, R Sommer, R Teixeira
Proceedings of the 22nd international conference on World Wide Web, 447-458, 2013
3052013
Dynamic application-layer protocol analysis for network intrusion detection
H Dreger, A Feldmann, M Mai, V Paxson, R Sommer
15th USENIX security symposium, 257-272, 2006
2882006
Through the eye of the PLC: semantic security monitoring for industrial processes
D Hadžiosmanović, R Sommer, E Zambon, PH Hartel
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
2632014
The NIDS cluster: Scalable, stateful network intrusion detection on commodity hardware
M Vallentin, R Sommer, J Lee, C Leres, V Paxson, B Tierney
Recent Advances in Intrusion Detection: 10th International Symposium, RAID …, 2007
2102007
Operational experiences with high-volume network intrusion detection
H Dreger, A Feldmann, V Paxson, R Sommer
Proceedings of the 11th ACM conference on Computer and communications …, 2004
2062004
Recent Advances in Intrusion Detection
JHA SOMESH, R SOMMER, C KREIBICH
vol 6307, 15, 2010
1692010
Cybercasing the Joint: On the Privacy Implications of {Geo-Tagging}
G Friedland, R Sommer
5th USENIX workshop on Hot Topics in Security (HotSec 10), 2010
1692010
On the reliability of profile matching across large online social networks
O Goga, P Loiseau, R Sommer, R Teixeira, KP Gummadi
Proceedings of the 21th ACM SIGKDD international conference on knowledge …, 2015
1572015
binpac: A yacc for writing application protocol parsers
R Pang, V Paxson, R Sommer, L Peterson
Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, 289-300, 2006
1572006
Building a time machine for efficient recording and retrieval of high-volume network traffic
S Kornexl, V Paxson, H Dreger, A Feldmann, R Sommer
5th Internet Measurement Conference, 267-272, 2005
1512005
NetFlow: Information loss or win?
R Sommer, A Feldmann
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, 173-174, 2002
1512002
Here's my cert, so trust me, maybe? Understanding TLS errors on the web
D Akhawe, J Amann, M Vallentin, R Sommer
Proceedings of the 22nd international conference on World Wide Web, 59-70, 2013
1322013
Enriching network security analysis with time travel
G Maier, R Sommer, H Dreger, A Feldmann, V Paxson, F Schneider
Proceedings of the ACM SIGCOMM 2008 conference on Data communication, 183-194, 2008
1322008
Detecting Forged TCP Reset Packets.
N Weaver, R Sommer, V Paxson
NDSS, 2009
1052009
An architecture for exploiting multi-core processors to parallelize network intrusion prevention
V Paxson, R Sommer, N Weaver
2007 IEEE Sarnoff Symposium, 1-7, 2007
1022007
Rethinking Hardware Support for Network Analysis and Intrusion Prevention.
V Paxson, K Asanovic, S Dharmapurikar, JW Lockwood, R Pang, ...
HotSec, 2006
952006
Predicting the resource consumption of network intrusion detection systems
H Dreger, A Feldmann, V Paxson, R Sommer
ACM SIGMETRICS Performance Evaluation Review 36 (1), 437-438, 2008
902008
Enhancing the accuracy of network-based intrusion detection with host-based context
H Dreger, C Kreibich, V Paxson, R Sommer
International Conference on Detection of Intrusions and Malware, and …, 2005
832005
The system can't perform the operation now. Try again later.
Articles 1–20