Publications

Found 11 results
Author Title [ Type(Desc)] Year
Filters: Author is Anja Feldmann  [Clear All Filters]
Conference Paper
Maier, G., Feldmann A., Paxson V., Sommer R., & Vallentin M. (2011).  An Assessment of Overt Malicious Activity Manifest in Residential Networks.
Kornexl, S.., Paxson V., Dreger H., Feldmann A., & Sommer R. (2005).  Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic. Proceedings of the Fifth ACM Conference on Internet Measurement (IMC 2005). 267-272.
Maier, G., Feldmann A., Paxson V., & Allman M. (2009).  On Dominant Characteristics of Residential Broadband Internet Traffic. 90-102.
Dreger, H., Feldmann A., Mai M.., Paxson V., & Sommer R. (2006).  Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection. Proceedings of the 15th USENIX Security Symposium (Security '06).
Maier, G., Sommer R., Dreger H., Feldmann A., Paxson V., & Schneider F. (2008).  Enriching Network Security Analysis with Time Travel. 183-194.
Maier, G., Schneider F., & Feldmann A. (2010).  A First Look at Mobile Hand-held Device Traffic. 161-170.
Levin, D., Wundsam A., Heller B., Handigol N., & Feldmann A. (2012).  Logically Centralized? State Distribution Tradeoffs in Software Defined Networks.
Richter, P., Wohlfart F., Vallina-Rodriguez N., Allman M., Bush R., Feldmann A., et al. (2016).  A Multi-perspective Analysis of Carrier-Grade NAT Deployment. Proceedings of ACM Internet Measurement Conference.
Maier, G., Schneider F., & Feldmann A. (2011).  NAT Usage in Residential Broadband Networks.
Dreger, H., Feldmann A., Paxson V., & Sommer R. (2004).  Operational Experiences with High-Volume Network Intrusion Detection. Proceedings of the 11th ACM Conference on Computer Communications Security (CCS 2004). 11, 2.
Dreger, H., Feldmann A., Paxson V., & Sommer R. (2008).  Predicting the Resource Consumption of Network Intrusion Detection Systems. 135-154.