default search action
Engin Kirda
Person information
- affiliation: Northeastern University, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Meng Luo, Bo Feng, Long Lu, Engin Kirda, Kui Ren:
On the Complexity of the Web's PKI: Evaluating Certificate Validation of Mobile Browsers. IEEE Trans. Dependable Secur. Comput. 21(1): 419-433 (2024) - [j26]Sevtap Duman, Matthias Büchler, Manuel Egele, Engin Kirda:
PellucidAttachment: Protecting Users From Attacks via E-Mail Attachments. IEEE Trans. Dependable Secur. Comput. 21(3): 1342-1354 (2024) - [j25]Bo Feng, Meng Luo, Changming Liu, Long Lu, Engin Kirda:
AIM: Automatic Interrupt Modeling for Dynamic Firmware Analysis. IEEE Trans. Dependable Secur. Comput. 21(4): 3866-3882 (2024) - [c167]Narmeen Shafqat, Cem Topcuoglu, Engin Kirda, Aanjhan Ranganathan:
Assessing the Feasibility of the Virtual Smartphone Paradigm in Countering Zero-Click Attacks. HICSS 2024: 7427-7436 - [c166]Cem Topcuoglu, Kaan Onarlioglu, Bahruz Jabiyev, Engin Kirda:
Untangle: Multi-Layer Web Server Fingerprinting. NDSS 2024 - [c165]Bahruz Jabiyev, Anthony Gavazzi, Kaan Onarlioglu, Engin Kirda:
Gudifu: Guided Differential Fuzzing for HTTP Request Parsing Discrepancies. RAID 2024: 235-247 - [c164]Changming Liu, Alejandro Mera, Engin Kirda, Meng Xu, Long Lu:
CO3: Concolic Co-execution for Firmware. USENIX Security Symposium 2024 - [c163]Alejandro Mera, Changming Liu, Ruimin Sun, Engin Kirda, Long Lu:
SHiFT: Semi-hosted Fuzz Testing for Embedded Applications. USENIX Security Symposium 2024 - [i17]Michael Shaham, Risha Ranjan, Engin Kirda, Taskin Padir:
Design and Realization of a Benchmarking Testbed for Evaluating Autonomous Platooning Algorithms. CoRR abs/2402.09233 (2024) - 2023
- [c162]Tommaso Innocenti, Matteo Golinelli, Kaan Onarlioglu, Seyed Ali Mirheidari, Bruno Crispo, Engin Kirda:
OAuth 2.0 Redirect URI Validation Falls Short, Literally. ACSAC 2023: 256-267 - [c161]Anthony Gavazzi, Ryan Williams, Engin Kirda, Long Lu, Andre King, Andy Davis, Tim Leek:
A Study of Multi-Factor and Risk-Based Authentication Availability. USENIX Security Symposium 2023: 2043-2060 - [c160]Ryan Williams, Anthony Gavazzi, Engin Kirda:
Solder: Retrofitting Legacy Code with Cross-Language Patches. SANER 2023: 49-60 - [e9]Weizhi Meng, Christian Damsgaard Jensen, Cas Cremers, Engin Kirda:
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023. ACM 2023 [contents] - [i16]Bo Feng, Meng Luo, Changming Liu, Long Lu, Engin Kirda:
AIM: Automatic Interrupt Modeling for Dynamic Firmware Analysis. CoRR abs/2312.01195 (2023) - 2022
- [j24]Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Hidayet Aksu, Patrick D. McDaniel, Engin Kirda, A. Selcuk Uluagac:
Who's Controlling My Device? Multi-User Multi-Device-Aware Access Control System for Shared Smart Home Environment. ACM Trans. Internet Things 3(4): 27:1-27:39 (2022) - [j23]William Blair, Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William Robertson, Engin Kirda, Manuel Egele:
HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. ACM Trans. Priv. Secur. 25(4): 33:1-33:35 (2022) - [c159]Afsah Anwar, Yi Hui Chen, Roy Hodgman, Tom Sellers, Engin Kirda, Alina Oprea:
A Recent Year On the Internet: Measuring and Understanding the Threats to Everyday Internet Devices. ACSAC 2022: 251-266 - [c158]Steven Sprecher, Christoph Kerschbaumer, Engin Kirda:
SoK: All or Nothing - A Postmortem of Solutions to the Third-Party Script Inclusion Permission Model and a Path Forward. EuroS&P 2022: 206-222 - [c157]Alejandro Mera, Yi Hui Chen, Ruimin Sun, Engin Kirda, Long Lu:
D-Box: DMA-enabled Compartmentalization for Embedded Applications. NDSS 2022 - [c156]Seyed Ali Mirheidari, Matteo Golinelli, Kaan Onarlioglu, Engin Kirda, Bruno Crispo:
Web Cache Deception Escalates! USENIX Security Symposium 2022: 179-196 - [c155]Bahruz Jabiyev, Steven Sprecher, Anthony Gavazzi, Tommaso Innocenti, Kaan Onarlioglu, Engin Kirda:
FRAMESHIFTER: Security Implications of HTTP/2-to-HTTP/1 Conversion Anomalies. USENIX Security Symposium 2022: 1061-1075 - [i15]Alejandro Mera, Yi Hui Chen, Ruimin Sun, Engin Kirda, Long Lu:
D-Box: DMA-enabled Compartmentalization for Embedded Applications. CoRR abs/2201.05199 (2022) - [i14]Narmeen Shafqat, Cem Topcuoglu, Engin Kirda, Aanjhan Ranganathan:
Experience Report on the Challenges and Opportunities in Securing Smartphones Against Zero-Click Attacks. CoRR abs/2211.03015 (2022) - 2021
- [c154]Bahruz Jabiyev, Sinan Pehlivanoglu, Kaan Onarlioglu, Engin Kirda:
FADE: Detecting Fake News Articles on the Web. ARES 2021: 15:1-15:10 - [c153]Bahruz Jabiyev, Steven Sprecher, Kaan Onarlioglu, Engin Kirda:
T-Reqs: HTTP Request Smuggling with Differential Fuzzing. CCS 2021: 1805-1820 - [c152]Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selçuk:
In-Browser Cryptomining for Good: An Untold Story. DAPPS 2021: 20-29 - [c151]Tommaso Innocenti, Seyed Ali Mirheidari, Amin Kharraz, Bruno Crispo, Engin Kirda:
You've Got (a Reset) Mail: A Security Analysis of Email-Based Password Reset Procedures. DIMVA 2021: 1-20 - [c150]Omid Mirzaei, Roman Vasilenko, Engin Kirda, Long Lu, Amin Kharraz:
SCRUTINIZER: Detecting Code Reuse in Malware via Decompilation and Machine Learning. DIMVA 2021: 130-150 - [c149]Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selçuk:
SoK: Cryptojacking Malware. EuroS&P 2021: 120-139 - [c148]Andrea Mambretti, Alexandra Sandulescu, Alessandro Sorniotti, William Robertson, Engin Kirda, Anil Kurmus:
Bypassing memory safety mechanisms through speculative control flow hijacks. EuroS&P 2021: 633-649 - [c147]Seyed Ali Akhavani, Jordan Jueckstock, Junhua Su, Alexandros Kapravelos, Engin Kirda, Long Lu:
Browserprint: an Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy. ISC 2021: 161-176 - [c146]Bahruz Jabiyev, Omid Mirzaei, Amin Kharraz, Engin Kirda:
Preventing server-side request forgery attacks. SAC 2021: 1626-1635 - [c145]Alejandro Mera, Bo Feng, Long Lu, Engin Kirda:
DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis. SP 2021: 1938-1954 - [c144]Bahruz Jabiyev, Jeremiah Onaolapo, Gianluca Stringhini, Engin Kirda:
e-Game of FAME: Automatic Detection of FAke MEmes. TTO 2021: 1-11 - [c143]Andrea Mambretti, Pasquale Convertini, Alessandro Sorniotti, Alexandra Sandulescu, Engin Kirda, Anil Kurmus:
GhostBuster: understanding and overcoming the pitfalls of transient execution vulnerability checkers. SANER 2021: 307-317 - [i13]Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selçuk:
SoK: Cryptojacking Malware. CoRR abs/2103.03851 (2021) - 2020
- [c142]William Blair, Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William Robertson, Engin Kirda, Manuel Egele:
HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. NDSS 2020 - [c141]Ahmet Salih Buyukkayhan, Can Gemicioglu, Tobias Lauinger, Alina Oprea, William Robertson, Engin Kirda:
What's in an Exploit? An Empirical Analysis of Reflected Server XSS Exploitation Techniques. RAID 2020: 107-120 - [c140]Seyed Ali Mirheidari, Sajjad Arshad, Kaan Onarlioglu, Bruno Crispo, Engin Kirda, William Robertson:
Cached and Confused: Web Cache Deception in the Wild. USENIX Security Symposium 2020: 665-682 - [c139]Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick D. McDaniel, Engin Kirda, A. Selcuk Uluagac:
Kratos: multi-user multi-device-aware access control system for the smart home. WISEC 2020: 1-12 - [i12]William Blair, Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William K. Robertson, Engin Kirda, Manuel Egele:
HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. CoRR abs/2002.03416 (2020) - [i11]Andrea Mambretti, Alexandra Sandulescu, Alessandro Sorniotti, William K. Robertson, Engin Kirda, Anil Kurmus:
Bypassing memory safety mechanisms through speculative control flow hijacks. CoRR abs/2003.05503 (2020) - [i10]Alejandro Mera, Bo Feng, Long Lu, Engin Kirda, William K. Robertson:
DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis. CoRR abs/2007.01502 (2020)
2010 – 2019
- 2019
- [c138]Andrea Mambretti, Matthias Neugschwandtner, Alessandro Sorniotti, Engin Kirda, William K. Robertson, Anil Kurmus:
Speculator: a tool to analyze speculative execution attacks and mitigations. ACSAC 2019: 747-761 - [c137]Florian Quinkert, Tobias Lauinger, William K. Robertson, Engin Kirda, Thorsten Holz:
It's Not what It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains. CNS 2019: 259-267 - [c136]Muhammad Ahmad Bashir, Sajjad Arshad, Engin Kirda, William K. Robertson, Christo Wilson:
A Longitudinal Analysis of the ads.txt Standard. Internet Measurement Conference 2019: 294-307 - [c135]Walter Rweyemamu, Tobias Lauinger, Christo Wilson, William K. Robertson, Engin Kirda:
Getting Under Alexa's Umbrella: Infiltration Attacks Against Internet Top Domain Lists. ISC 2019: 255-276 - [c134]Abbas Acar, Long Lu, A. Selcuk Uluagac, Engin Kirda:
An Analysis of Malware Trends in Enterprise Networks. ISC 2019: 360-380 - [c133]Walter Rweyemamu, Tobias Lauinger, Christo Wilson, William K. Robertson, Engin Kirda:
Clustering and the Weekend Effect: Recommendations for the Use of Top Domain Lists in Security Research. PAM 2019: 161-177 - [c132]Amin Kharraz, Brandon L. Daley, Graham Z. Baker, William Robertson, Engin Kirda:
USBESAFE: An End-Point Solution to Protect Against USB-Based Attacks. RAID 2019: 89-103 - [e8]Steven D. Galbraith, Giovanni Russello, Willy Susilo, Dieter Gollmann, Engin Kirda, Zhenkai Liang:
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019. ACM 2019, ISBN 978-1-4503-6752-3 [contents] - [i9]Abbas Acar, Long Lu, A. Selcuk Uluagac, Engin Kirda:
An Analysis of Malware Trends in Enterprise Networks. CoRR abs/1910.00508 (2019) - [i8]Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick D. McDaniel, Engin Kirda, A. Selcuk Uluagac:
Multi-User Multi-Device-Aware Access Control System for Smart Home. CoRR abs/1911.10186 (2019) - [i7]Seyed Ali Mirheidari, Sajjad Arshad, Kaan Onarlioglu, Bruno Crispo, Engin Kirda, William K. Robertson:
Cached and Confused: Web Cache Deception in the Wild. CoRR abs/1912.10190 (2019) - 2018
- [j22]Amin Kharraz, William K. Robertson, Engin Kirda:
Protecting against Ransomware: A New Line of Research or Restating Classic Ideas? IEEE Secur. Priv. 16(3): 103-107 (2018) - [c131]Reza Mirzazade Farkhani, Saman Jafari, Sajjad Arshad, William K. Robertson, Engin Kirda, Hamed Okhravi:
On the Effectiveness of Type-based Control Flow Integrity. ACSAC 2018: 28-39 - [c130]Kaan Onarlioglu, William K. Robertson, Engin Kirda:
Eraser: Your Data Won't Be Back. EuroS&P 2018: 153-166 - [c129]Tobias Lauinger, Ahmet Salih Buyukkayhan, Abdelberi Chaabane, William K. Robertson, Engin Kirda:
From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the Drop. Internet Measurement Conference 2018: 322-328 - [c128]Muhammad Ahmad Bashir, Sajjad Arshad, Engin Kirda, William K. Robertson, Christo Wilson:
How Tracking Companies Circumvented Ad Blockers Using WebSockets. Internet Measurement Conference 2018: 471-477 - [c127]Amin Kharraz, William K. Robertson, Engin Kirda:
Surveylance: Automatically Detecting Online Survey Scams. IEEE Symposium on Security and Privacy 2018: 70-86 - [c126]Sajjad Arshad, Seyed Ali Mirheidari, Tobias Lauinger, Bruno Crispo, Engin Kirda, William K. Robertson:
Large-Scale Analysis of Style Injection by Relative Path Overwrite. WWW 2018: 237-246 - [i6]Reza Mirzazade Farkhani, Saman Jafari, Sajjad Arshad, William K. Robertson, Engin Kirda, Hamed Okhravi:
On the Effectiveness of Type-based Control Flow Integrity. CoRR abs/1810.10649 (2018) - [i5]Sajjad Arshad, Seyed Ali Mirheidari, Tobias Lauinger, Bruno Crispo, Engin Kirda, William K. Robertson:
Large-Scale Analysis of Style Injection by Relative Path Overwrite. CoRR abs/1811.00917 (2018) - [i4]Tobias Lauinger, Abdelberi Chaabane, Sajjad Arshad, William K. Robertson, Christo Wilson, Engin Kirda:
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web. CoRR abs/1811.00918 (2018) - 2017
- [j21]Wojciech Mazurczyk, Maciej Korczynski, Koji Nakao, Engin Kirda, Cristian Hesselman, Katsunari Yoshioka:
Traffic Measurements for Cyber Security. IEEE Commun. Mag. 55(7): 12-13 (2017) - [j20]Collin Mulliner, William K. Robertson, Engin Kirda:
On the misuse of graphical user interface elements to implement security controls. it Inf. Technol. 59(2): 59 (2017) - [c125]Michael Weissbacher, Enrico Mariconti, Guillermo Suarez-Tangil, Gianluca Stringhini, William K. Robertson, Engin Kirda:
Ex-Ray: Detection of History-Leaking Browser Extensions. ACSAC 2017: 590-602 - [c124]William Koch, Abdelberi Chaabane, Manuel Egele, William K. Robertson, Engin Kirda:
Semi-automated discovery of server-based information oversharing vulnerabilities in Android applications. ISSTA 2017: 147-157 - [c123]Tobias Lauinger, Abdelberi Chaabane, Sajjad Arshad, William Robertson, Christo Wilson, Engin Kirda:
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web. NDSS 2017 - [c122]Amin Kharraz, Engin Kirda:
Redemption: Real-Time Protection Against Ransomware at End-Hosts. RAID 2017: 98-119 - [c121]Engin Kirda:
UNVEIL: A large-scale, automated approach to detecting ransomware (keynote). SANER 2017: 1 - [e7]Engin Kirda, Thomas Ristenpart:
26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16-18, 2017. USENIX Association 2017 [contents] - 2016
- [c120]Sevtap Duman, Kubra Kalkan-Cakmakci, Manuel Egele, William K. Robertson, Engin Kirda:
EmailProfiler: Spearphishing Filtering with Header and Stylometric Features of Emails. COMPSAC 2016: 408-416 - [c119]Kaan Onarlioglu, William Robertson, Engin Kirda:
Overhaul: Input-Driven Access Control for Better Privacy on Traditional Operating Systems. DSN 2016: 443-454 - [c118]Patrick Carter, Collin Mulliner, Martina Lindorfer, William K. Robertson, Engin Kirda:
CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes. Financial Cryptography 2016: 231-249 - [c117]Tobias Lauinger, Kaan Onarlioglu, Abdelberi Chaabane, William Robertson, Engin Kirda:
WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration. Internet Measurement Conference 2016: 247-253 - [c116]Ahmet Salih Buyukkayhan, Kaan Onarlioglu, William K. Robertson, Engin Kirda:
CrossFire: An Analysis of Firefox Extension-Reuse Vulnerabilities. NDSS 2016 - [c115]Andrea Mambretti, Kaan Onarlioglu, Collin Mulliner, William Robertson, Engin Kirda, Federico Maggi, Stefano Zanero:
Trellis: Privilege Separation for Multi-user Applications Made Easy. RAID 2016: 437-456 - [c114]Brendan Dolan-Gavitt, Patrick Hulin, Engin Kirda, Tim Leek, Andrea Mambretti, William K. Robertson, Frederick Ulrich, Ryan Whelan:
LAVA: Large-Scale Automated Vulnerability Addition. IEEE Symposium on Security and Privacy 2016: 110-121 - [c113]Yanick Fratantonio, Antonio Bianchi, William K. Robertson, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
TriggerScope: Towards Detecting Logic Bombs in Android Applications. IEEE Symposium on Security and Privacy 2016: 377-396 - [c112]Matthias Neugschwandtner, Collin Mulliner, William K. Robertson, Engin Kirda:
Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices. TRUST 2016: 60-81 - [c111]Amin Kharraz, Sajjad Arshad, Collin Mulliner, William K. Robertson, Engin Kirda:
UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware. USENIX Security Symposium 2016: 757-772 - 2015
- [j19]Kaan Onarlioglu, Ahmet Salih Buyukkayhan, William K. Robertson, Engin Kirda:
SENTINEL: Securing Legacy Firefox Extensions. Comput. Secur. 49: 147-161 (2015) - [j18]Aristide Fattori, Andrea Lanzi, Davide Balzarotti, Engin Kirda:
Hypervisor-based malware protection with AccessMiner. Comput. Secur. 52: 33-50 (2015) - [c110]Amin Kharraz, William K. Robertson, Davide Balzarotti, Leyla Bilge, Engin Kirda:
Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks. DIMVA 2015: 3-24 - [c109]Yanick Fratantonio, Antonio Bianchi, William K. Robertson, Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna:
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users. DIMVA 2015: 282-303 - [c108]Ahmet Talha Ozcan, Can Gemicioglu, Kaan Onarlioglu, Michael Weissbacher, Collin Mulliner, William K. Robertson, Engin Kirda:
BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications. Financial Cryptography 2015: 355-369 - [c107]Michael Weissbacher, William K. Robertson, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities. USENIX Security Symposium 2015: 737-752 - 2014
- [j17]Leyla Bilge, Sevil Sen, Davide Balzarotti, Engin Kirda, Christopher Kruegel:
Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains. ACM Trans. Inf. Syst. Secur. 16(4): 14 (2014) - [c106]Sevtap Duman, Kaan Onarlioglu, Ali Osman Ulusoy, William K. Robertson, Engin Kirda:
TrueClick: automatically distinguishing trick banners from genuine download links. ACSAC 2014: 456-465 - [c105]Collin Mulliner, William K. Robertson, Engin Kirda:
VirtualSwindle: an automated attack against in-app billing on android. AsiaCCS 2014: 459-470 - [c104]Amin Kharraz, Engin Kirda, William K. Robertson, Davide Balzarotti, Aurélien Francillon:
Optical Delusions: A Study of Malicious QR Codes in the Wild. DSN 2014: 192-203 - [c103]Collin Mulliner, William K. Robertson, Engin Kirda:
Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces. IEEE Symposium on Security and Privacy 2014: 149-162 - [c102]Stevens Le Blond, Adina Uritesc, Cédric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda:
A Look at Targeted Attacks Through the Lense of an NGO. USENIX Security Symposium 2014: 543-558 - 2013
- [c101]Ting-Fang Yen, Alina Oprea, Kaan Onarlioglu, Todd Leetham, William K. Robertson, Ari Juels, Engin Kirda:
Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks. ACSAC 2013: 199-208 - [c100]Collin Mulliner, Jon Oberheide, William K. Robertson, Engin Kirda:
PatchDroid: scalable third-party security patches for Android devices. ACSAC 2013: 259-268 - [c99]Kaan Onarlioglu, Mustafa Battal, William K. Robertson, Engin Kirda:
Securing Legacy Firefox Extensions with SENTINEL. DIMVA 2013: 122-138 - [c98]Aldo Cassola, William K. Robertson, Engin Kirda, Guevara Noubir:
A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication. NDSS 2013 - [c97]Tobias Lauinger, Martin Szydlowski, Kaan Onarlioglu, Gilbert Wondracek, Engin Kirda, Christopher Krügel:
Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting. NDSS 2013 - [c96]Tobias Lauinger, Kaan Onarlioglu, Chaabane Abdelberi, Engin Kirda, William K. Robertson, Mohamed Ali Kâafar:
Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters. RAID 2013: 369-389 - [c95]Kaan Onarlioglu, Collin Mulliner, William K. Robertson, Engin Kirda:
PrivExec: Private Execution as an Operating System Service. IEEE Symposium on Security and Privacy 2013: 206-220 - [i3]Engin Kirda:
DarkDroid - Exposing the Dark Side of Malicious Mobile Applications. ERCIM News 2013(93) (2013) - 2012
- [j16]Tobias Lauinger, Nikolaos Laoutaris, Pablo Rodriguez, Thorsten Strufe, Ernst W. Biersack, Engin Kirda:
Privacy risks in named data networking: what is the cost of performance? Comput. Commun. Rev. 42(5): 54-57 (2012) - [j15]Manuel Egele, Andreas Moser, Christopher Kruegel, Engin Kirda:
PoX: Protecting users from malicious Facebook applications. Comput. Commun. 35(12): 1507-1515 (2012) - [j14]Theodoor Scholte, Davide Balzarotti, Engin Kirda:
Have things changed now? An empirical study on input validation vulnerabilities in web applications. Comput. Secur. 31(3): 344-356 (2012) - [j13]Manuel Egele, Theodoor Scholte, Engin Kirda, Christopher Kruegel:
A survey on automated dynamic malware-analysis techniques and tools. ACM Comput. Surv. 44(2): 6:1-6:42 (2012) - [j12]Advait Abhay Dixit, Rik Farrow, Andrew D. Ferguson, Katrina LaCurts, Marcelo Martins, Karthik Nagaraj, Kevin Ngo, Will Scott, Manuel Egele, Engin Kirda:
NSDI '12 and LEET '12. login Usenix Mag. 37(4) (2012) - [c94]Leyla Bilge, Davide Balzarotti, William K. Robertson, Engin Kirda, Christopher Kruegel:
Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis. ACSAC 2012: 129-138 - [c93]Theodoor Scholte, William K. Robertson, Davide Balzarotti, Engin Kirda:
Preventing Input Validation Vulnerabilities in Web Applications through Automated Type Analysis. COMPSAC 2012: 233-243 - [c92]Engin Kirda:
A security analysis of Amazon's Elastic Compute Cloud service. DSN Workshops 2012: 1 - [c91]Davide Canali, Andrea Lanzi, Davide Balzarotti, Christopher Kruegel, Mihai Christodorescu, Engin Kirda:
A quantitative study of accuracy in system call-based malware detection. ISSTA 2012: 122-132 - [c90]Kaan Onarlioglu, Utku Ozan Yilmaz, Engin Kirda, Davide Balzarotti:
Insights into User Behavior in Dealing with Internet Attacks. NDSS 2012 - [c89]Tobias Lauinger, Engin Kirda, Pietro Michiardi:
Paying for Piracy? An Analysis of One-Click Hosters' Controversial Reward Schemes. RAID 2012: 169-189 - [c88]Theodoor Scholte, William K. Robertson, Davide Balzarotti, Engin Kirda:
An empirical analysis of input validation mechanisms in web applications and languages. SAC 2012: 1419-1426 - [c87]Marco Balduzzi, Jonas Zaddach, Davide Balzarotti, Engin Kirda, Sergio Loureiro:
A security analysis of amazon's elastic compute cloud service. SAC 2012: 1427-1434 - [c86]Grégoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
PUBCRAWL: Protecting Users and Businesses from CRAWLers. USENIX Security Symposium 2012: 507-522 - [e6]Engin Kirda:
5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '12, San Jose, CA, USA, April 24, 2012. USENIX Association 2012 [contents] - 2011
- [c85]Clemens Kolbitsch, Engin Kirda, Christopher Kruegel:
The power of procrastination: detection and mitigation of execution-stalling malicious code. CCS 2011: 285-296 - [c84]Danesh Irani, Marco Balduzzi, Davide Balzarotti, Engin Kirda, Calton Pu:
Reverse Social Engineering Attacks in Online Social Networks. DIMVA 2011: 55-74 - [c83]Theodoor Scholte, Davide Balzarotti, Engin Kirda:
Quo Vadis? A Study of the Evolution of Input Validation Vulnerabilities in Web Applications. Financial Cryptography 2011: 284-298 - [c82]Martin Szydlowski, Ben Y. Zhao, Engin Kirda, Christopher Kruegel:
BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients. ICCCN 2011: 1-6 - [c81]Endre Bangerter, Stefan Bühlmann, Engin Kirda:
Efficient and Stealthy Instruction Tracing and Its Applications in Automated Malware Analysis: Open Problems and Challenges. iNetSeC 2011: 55-64 - [c80]Marco Balduzzi, Carmen Torrano Gimenez, Davide Balzarotti, Engin Kirda:
Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications. NDSS 2011 - [c79]Leyla Bilge, Engin Kirda, Christopher Kruegel, Marco Balduzzi:
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis. NDSS 2011 - [c78]Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna:
PiOS: Detecting Privacy Leaks in iOS Applications. NDSS 2011 - [c77]Manuel Egele, Andreas Moser, Christopher Kruegel, Engin Kirda:
PoX: Protecting users from malicious Facebook applications. PerCom Workshops 2011: 288-294 - [e5]Engin Kirda, Thorsten Holz:
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS@EuroSys 2011, Salzburg, Austria, April 10, 2011. ACM 2011, ISBN 978-1-4503-0768-0 [contents] - [e4]Engin Kirda, Steven Hand:
Proceedings of the Fourth European Workshop on System Security, EUROSEC'11, April 10, 2011, Salzburg, Austria. ACM 2011, ISBN 978-1-4503-0613-3 [contents] - [r2]Engin Kirda:
Cross Site Scripting Attacks. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 275-277 - [r1]Engin Kirda:
Malware Behavior Clustering. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 751-752 - 2010
- [j11]Nenad Jovanovic, Christopher Kruegel, Engin Kirda:
Static analysis for detecting taint-style vulnerabilities in web applications. J. Comput. Secur. 18(5): 861-907 (2010) - [c76]Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide Balzarotti, Engin Kirda:
G-Free: defeating return-oriented programming through gadget-less binaries. ACSAC 2010: 49-58 - [c75]Marco Balduzzi, Manuel Egele, Engin Kirda, Davide Balzarotti, Christopher Kruegel:
A solution for the automated detection of clickjacking attacks. AsiaCCS 2010: 135-144 - [c74]Andrea Lanzi, Davide Balzarotti, Christopher Kruegel, Mihai Christodorescu, Engin Kirda:
AccessMiner: using system-centric models for malware protection. CCS 2010: 399-412 - [c73]Corrado Leita, Ulrich Bayer, Engin Kirda:
Exploiting diverse observation perspectives to get insights on the malware landscape. DSN 2010: 393-402 - [c72]Tobias Lauinger, Veikko Pankakoski, Davide Balzarotti, Engin Kirda:
Honeybot, Your Man in the Middle for Automated Social Engineering. LEET 2010 - [c71]Davide Balzarotti, Marco Cova, Christoph Karlberger, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
Efficient Detection of Split Personalities in Malware. NDSS 2010 - [c70]Marco Balduzzi, Christian Platzer, Thorsten Holz, Engin Kirda, Davide Balzarotti, Christopher Kruegel:
Abusing Social Networks for Automated User Profiling. RAID 2010: 422-441 - [c69]Manuel Egele, Leyla Bilge, Engin Kirda, Christopher Kruegel:
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms. SAC 2010: 1865-1870 - [c68]Ulrich Bayer, Engin Kirda, Christopher Kruegel:
Improving the efficiency of dynamic malware analysis. SAC 2010: 1871-1878 - [c67]Clemens Kolbitsch, Thorsten Holz, Christopher Kruegel, Engin Kirda:
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries. IEEE Symposium on Security and Privacy 2010: 29-44 - [c66]Paolo Milani Comparetti, Guido Salvaneschi, Engin Kirda, Clemens Kolbitsch, Christopher Kruegel, Stefano Zanero:
Identifying Dormant Functionality in Malware Programs. IEEE Symposium on Security and Privacy 2010: 61-76 - [c65]Gilbert Wondracek, Thorsten Holz, Engin Kirda, Christopher Kruegel:
A Practical Attack to De-anonymize Social Network Users. IEEE Symposium on Security and Privacy 2010: 223-238 - [c64]Gilbert Wondracek, Thorsten Holz, Christian Platzer, Engin Kirda, Christopher Kruegel:
Is the Internet for Porn? An Insight Into the Online Adult Industry. WEIS 2010 - [p1]Marc Dacier, Corrado Leita, Olivier Thonnard, Hau-Van Pham, Engin Kirda:
Assessing Cybercrime Through the Eyes of the WOMBAT. Cyber Situational Awareness 2010: 103-136 - [e3]Manuel Costa, Engin Kirda:
Proceedings of the Third European Workshop on System Security, EUROSEC 2010, Paris, France, April 13, 2010. ACM 2010, ISBN 978-1-4503-0059-9 [contents]
2000 – 2009
- 2009
- [j10]Engin Kirda, Nenad Jovanovic, Christopher Kruegel, Giovanni Vigna:
Client-side cross-site scripting protection. Comput. Secur. 28(7): 592-604 (2009) - [j9]Stefan Mitterhofer, Christopher Krügel, Engin Kirda, Christian Platzer:
Server-Side Bot Detection in Massively Multiplayer Online Games. IEEE Secur. Priv. 7(3): 29-36 (2009) - [j8]Giovanni Vigna, Fredrik Valeur, Davide Balzarotti, William K. Robertson, Christopher Kruegel, Engin Kirda:
Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries. J. Comput. Secur. 17(3): 305-329 (2009) - [c63]Brett Stone-Gross, Christopher Kruegel, Kevin C. Almeroth, Andreas Moser, Engin Kirda:
FIRE: FInding Rogue nEtworks. ACSAC 2009: 231-240 - [c62]Manuel Egele, Peter Wurzinger, Christopher Kruegel, Engin Kirda:
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks. DIMVA 2009: 88-106 - [c61]Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel, Engin Kirda:
Automatically Generating Models for Botnet Detection. ESORICS 2009: 232-249 - [c60]Theodoor Scholte, Engin Kirda:
Achieving Life-Cycle Compliance of Service-Oriented Architectures: Open Issues and Challenges. DPM/SETOP 2009: 253-267 - [c59]Peter Würzinger, Christian Platzer, Christian Ludl, Engin Kirda, Christopher Kruegel:
SWAP: Mitigating XSS attacks using a reverse proxy. SESS@ICSE 2009: 33-39 - [c58]Manuel Egele, Engin Kirda, Christopher Kruegel:
Mitigating Drive-By Download Attacks: Challenges and Open Problems. iNetSeC 2009: 52-62 - [c57]Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, Engin Kirda:
Automated Spyware Collection and Analysis. ISC 2009: 202-217 - [c56]Ulrich Bayer, Imam Habibi, Davide Balzarotti, Engin Kirda:
A View on Current Malware Behaviors. LEET 2009 - [c55]Ulrich Bayer, Paolo Milani Comparetti, Clemens Hlauschek, Christopher Krügel, Engin Kirda:
Scalable, Behavior-Based Malware Clustering. NDSS 2009 - [c54]Paolo Milani Comparetti, Gilbert Wondracek, Christopher Krügel, Engin Kirda:
Prospex: Protocol Specification Extraction. SP 2009: 110-125 - [c53]Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Xiao-yong Zhou, XiaoFeng Wang:
Effective and Efficient Malware Detection at the End Host. USENIX Security Symposium 2009: 351-366 - [c52]Leyla Bilge, Thorsten Strufe, Davide Balzarotti, Engin Kirda:
All your contacts are belong to us: automated identity theft attacks on social networks. WWW 2009: 551-560 - [e2]Engin Kirda, Somesh Jha, Davide Balzarotti:
Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings. Lecture Notes in Computer Science 5758, Springer 2009, ISBN 978-3-642-04341-3 [contents] - 2008
- [c51]Gilbert Wondracek, Paolo Milani Comparetti, Christopher Krügel, Engin Kirda:
Automatic Network Protocol Analysis. NDSS 2008 - [c50]Sean McAllister, Engin Kirda, Christopher Kruegel:
Leveraging User Interactions for In-Depth Testing of Web Applications. RAID 2008: 191-210 - [c49]Guenther Starnberger, Christopher Kruegel, Engin Kirda:
Overbot: a botnet protocol based on Kademlia. SecureComm 2008: 13 - [c48]Eric Medvet, Engin Kirda, Christopher Kruegel:
Visual-similarity-based phishing detection. SecureComm 2008: 22 - [c47]Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. SP 2008: 387-401 - [e1]Richard Lippmann, Engin Kirda, Ari Trachtenberg:
Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings. Lecture Notes in Computer Science 5230, Springer 2008, ISBN 978-3-540-87402-7 [contents] - [i2]Lothar Braun, Falko Dressler, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Tobias Limmer, Konrad Rieck, James P. G. Sterbenz:
08102 Working Group -- Requirements for Network Monitoring from an IDS Perspective. Network Attack Detection and Defense 2008 - [i1]Marc Dacier, Hervé Debar, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Konrad Rieck, James P. G. Sterbenz:
8102 Working Group -- Attack Taxonomy. Network Attack Detection and Defense 2008 - 2007
- [j7]Patrick Klinkoff, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
Extending .NET security to unmanaged code. Int. J. Inf. Sec. 6(6): 417-428 (2007) - [c46]Martin Szydlowski, Christopher Kruegel, Engin Kirda:
Secure Input for Web Applications. ACSAC 2007: 375-384 - [c45]Andreas Moser, Christopher Kruegel, Engin Kirda:
Limits of Static Analysis for Malware Detection. ACSAC 2007: 421-430 - [c44]Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda:
Panorama: capturing system-wide information flow for malware detection and analysis. CCS 2007: 116-127 - [c43]Christian Ludl, Sean McAllister, Engin Kirda, Christopher Kruegel:
On the Effectiveness of Techniques to Detect Phishing Sites. DIMVA 2007: 20-39 - [c42]Thomas Raffetseder, Engin Kirda, Christopher Kruegel:
Building Anti-Phishing Browser Plug-Ins: An Experience Report. SESS@ICSE 2007: 6 - [c41]Thomas Raffetseder, Christopher Krügel, Engin Kirda:
Detecting System Emulators. ISC 2007: 1-18 - [c40]Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Krügel, Giovanni Vigna:
Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. NDSS 2007 - [c39]Angelo P. E. Rosiello, Engin Kirda, Christopher Kruegel, Fabrizio Ferrandi:
A layout-similarity-based approach for detecting phishing pages. SecureComm 2007: 454-463 - [c38]Andreas Moser, Christopher Krügel, Engin Kirda:
Exploring Multiple Execution Paths for Malware Analysis. S&P 2007: 231-245 - [c37]Manuel Egele, Christopher Kruegel, Engin Kirda, Heng Yin, Dawn Xiaodong Song:
Dynamic Spyware Analysis. USENIX ATC 2007: 233-246 - [c36]Christoph Karlberger, Günther Bayler, Christopher Kruegel, Engin Kirda:
Exploiting Redundancy in Natural Language to Penetrate Bayesian Spam Filters. WOOT 2007 - 2006
- [j6]Engin Kirda, Christopher Krügel:
Protecting Users against Phishing Attacks. Comput. J. 49(5): 554-561 (2006) - [j5]Ulrich Bayer, Andreas Moser, Christopher Krügel, Engin Kirda:
Dynamic Analysis of Malicious Code. J. Comput. Virol. 2(1): 67-77 (2006) - [c35]Manuel Egele, Martin Szydlowski, Engin Kirda, Christopher Krügel:
Using Static Program Analysis to Aid Intrusion Detection. DIMVA 2006: 17-36 - [c34]Patrick Klinkoff, Christopher Krügel, Engin Kirda, Giovanni Vigna:
Extending .NET Security to Unmanaged Code. ISC 2006: 1-16 - [c33]Nenad Jovanovic, Christopher Kruegel, Engin Kirda:
Precise alias analysis for static detection of web application vulnerabilities. PLAS 2006: 27-36 - [c32]Engin Kirda, Christopher Krügel, Giovanni Vigna, Nenad Jovanovic:
Noxes: a client-side solution for mitigating cross-site scripting attacks. SAC 2006: 330-337 - [c31]Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Engin Kirda:
An anomaly-driven reverse proxy for web applications. SAC 2006: 361-368 - [c30]Nenad Jovanovic, Engin Kirda, Christopher Kruegel:
Preventing Cross Site Request Forgery Attacks. SecureComm 2006: 1-10 - [c29]Nenad Jovanovic, Christopher Krügel, Engin Kirda:
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper). S&P 2006: 258-263 - [c28]Engin Kirda, Christopher Kruegel:
Behavior-based Spyware Detection. USENIX Security Symposium 2006 - [c27]Stefan Kals, Engin Kirda, Christopher Krügel, Nenad Jovanovic:
SecuBat: a web vulnerability scanner. WWW 2006: 247-256 - 2005
- [j4]Clemens Kerer, Gerald Reif, Thomas Gschwind, Engin Kirda, Roman Kurmanowytsch, Marek Paralic:
ShareMe: Running a Distributed Systems Lab for 600 Students With Three Faculty Members. IEEE Trans. Educ. 48(3): 430-437 (2005) - [c26]Engin Kirda, Christopher Krügel:
Protecting Users Against Phishing Attacks with AntiPhish. COMPSAC (1) 2005: 517-524 - [c25]Christopher Krügel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna:
Polymorphic Worm Detection Using Structural Information of Executables. RAID 2005: 207-226 - [c24]Christopher Kruegel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna:
Automating Mimicry Attacks Using Static Binary Analysis. USENIX Security Symposium 2005 - 2004
- [c23]Engin Kirda, Clemens Kerer:
DIWE: A Framework for Constructing Device-Independent Web Applications. UMICS 2004: 96-110 - [c22]Clemens Kerer, Engin Kirda:
XGuide - Concurrent Web Engineering with Contracts. ICWE 2004: 88-92 - 2003
- [j3]Engin Kirda, Harald C. Gall:
A Service Architecture for Mobile Teamwork. Int. J. Softw. Eng. Knowl. Eng. 13(4): 447-467 (2003) - [c21]Roman Kurmanowytsch, Engin Kirda, Clemens Kerer, Schahram Dustdar:
OMNIX: A Topology-Independent P2P Middleware. CAiSE Workshops 2003 - [c20]Engin Kirda, Clemens Kerer, Christopher Krügel, Roman Kurmanowytsch:
Web Service Engineering with DIWE. EUROMICRO 2003: 283-290 - [c19]Sagar Chaki, Pascal Fenkam, Harald C. Gall, Somesh Jha, Engin Kirda, Helmut Veith:
Integrating Publish/Subscribe into a Mobile Teamwork Support Platform. SEKE 2003: 510-517 - [c18]Zorlu Yalniz, Engin Kirda:
Supporting Collaboration in the Development of Tools and Dies in Manufacturing Networks. WETICE 2003: 87- - 2002
- [j2]Clemens Kerer, Engin Kirda, Roman Kurmanowytsch:
A Generic Content-Management Tool for Web Databases. IEEE Internet Comput. 6(4): 38-42 (2002) - [c17]Engin Kirda, Harald C. Gall, Pascal Fenkam, Gerald Reif:
MOTION: A Peer-to-Peer Platform for Mobile Teamwork Support. COMPSAC 2002: 1115-1117 - [c16]Engin Kirda, Gerald Reif, Harald C. Gall, Pascal Fenkam:
TWSAPI: A Generic Teamwork Services Application Programming Interface. ICDCS Workshops 2002: 365-372 - [c15]Clemens Kerer, Engin Kirda, Christopher Krügel:
XGuide - A Practical Guide to XML-Based Web Engineering. NETWORKING Workshops 2002: 104-117 - [c14]Roman Kurmanowytsch, Mehdi Jazayeri, Engin Kirda:
Towards a Hierarchical, Semantic Peer-to-Peer Topology. Peer-to-Peer Computing 2002: 167-168 - [c13]Christopher Krügel, Thomas Toth, Engin Kirda:
Service specific anomaly detection for network intrusion detection. SAC 2002: 201-208 - [c12]Engin Kirda, Pascal Fenkam, Gerald Reif, Harald C. Gall:
A service architecture for mobile teamwork. SEKE 2002: 513-518 - [c11]Pascal Fenkam, Engin Kirda, Schahram Dustdar, Harald C. Gall, Gerald Reif:
Evaluation of a Publish/Subscribe System for Collaborative and Mobile Working. WETICE 2002: 23-28 - [c10]Pascal Fenkam, Schahram Dustdar, Engin Kirda, Gerald Reif, Harald C. Gall:
Towards an Access Control System for Mobile Peer-to-Peer Collaborative Environments. WETICE 2002: 95-102 - 2001
- [j1]Engin Kirda, Mehdi Jazayeri, Clemens Kerer, Markus W. Schranz:
Experiences in Engineering Flexible Web Services. IEEE Multim. 8(1): 58-65 (2001) - [c9]Clemens Kerer, Engin Kirda, Mehdi Jazayeri, Roman Kurmanowytsch:
Building and Managing XML/XSL-powered Web Sites: an Experience Report. COMPSAC 2001: 547-554 - [c8]Engin Kirda:
Web Engineering Device Independent Web Services. ICSE 2001: 795-796 - [c7]Christopher Krügel, Thomas Toth, Engin Kirda:
SPARTA, a Mobile Agent Based Instrusion Detection System. Network Security 2001: 187-198 - [c6]Engin Kirda:
Engineering of Web services with XML and XSL. ESEC / SIGSOFT FSE 2001: 318-319 - [c5]Clemens Kerer, Engin Kirda:
Layout, Content and Logic Separation in Web Engineering. Web Engineering 2001: 135-147 - [c4]Engin Kirda, Clemens Kerer, Mehdi Jazayeri, Christopher Krügel:
Supporting Multi-Device Enabled Web Services: Challenges and Open Problems. WETICE 2001: 49-54 - [c3]Gerald Reif, Engin Kirda, Harald C. Gall, Pascal Fenkam, Gian Pietro Picco, Gianpaolo Cugola:
A Web-Based Peer-to-Peer Architecture for Collaborative Nomadic Working. WETICE 2001: 334-339 - [c2]Engin Kirda, Clemens Kerer, Mehdi Jazayeri, Harald C. Gall, Roman Kurmanowytsch:
The Evolution of an Organizational Web Site: Migrating to XML/XSL. WSE 2001: 62-69 - 2000
- [c1]Engin Kirda, Clemens Kerer:
MyXML: An XML based template engine for the generation of flexible web content. WebNet 2000: 317-322
Coauthor Index
aka: Christopher Kruegel
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint