default search action
David Jaeger
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c16]Chris Pelchen, David Jaeger, Feng Cheng, Christoph Meinel:
The (Persistent) Threat of Weak Passwords: Implementation of a Semi-automatic Password-Cracking Algorithm. ISPEC 2019: 464-475 - 2018
- [b1]David Jaeger:
Enabling Big Data security analytics for advanced network attack detection. University of Potsdam, Germany, 2018 - [j3]David Jaeger, Hendrik Graupner, Chris Pelchen, Feng Cheng, Christoph Meinel:
Fast Automated Processing and Evaluation of Identity Leaks. Int. J. Parallel Program. 46(2): 441-470 (2018) - [c15]David Jaeger, Feng Cheng, Christoph Meinel:
Accelerating Event Processing for Security Analytics on a Distributed In-Memory Platform. DASC/PiCom/DataCom/CyberSciTech 2018: 634-643 - 2017
- [j2]Andrey Sapegin, David Jaeger, Feng Cheng, Christoph Meinel:
Towards a system for complex analysis of security events in large-scale networks. Comput. Secur. 67: 16-34 (2017) - [j1]Andrey Sapegin, Marian Gawron, David Jaeger, Feng Cheng, Christoph Meinel:
Evaluation of in-memory storage engine for machine learning analysis of security events. Concurr. Comput. Pract. Exp. 29(2) (2017) - [c14]Martin Ussath, David Jaeger, Feng Cheng, Christoph Meinel:
Identifying Suspicious User Behavior with Neural Networks. CSCloud 2017: 255-263 - 2016
- [c13]Hendrik Graupner, David Jaeger, Feng Cheng, Christoph Meinel:
Automated parsing and interpretation of identity leaks. Conf. Computing Frontiers 2016: 127-134 - [c12]Martin Ussath, David Jaeger, Feng Cheng, Christoph Meinel:
Advanced persistent threats: Behind the scenes. CISS 2016: 181-186 - 2015
- [c11]David Jaeger, Martin Ussath, Feng Cheng, Christoph Meinel:
Multi-step Attack Pattern Detection on Normalized Event Logs. CSCloud 2015: 390-398 - [c10]David Jaeger, Andrey Sapegin, Martin Ussath, Feng Cheng, Christoph Meinel:
Parallel and distributed normalization of security events for instant attack analysis. IPCCC 2015: 1-8 - [c9]Andrey Sapegin, Marian Gawron, David Jaeger, Feng Cheng, Christoph Meinel:
High-Speed Security Analytics Powered by In-Memory Machine Learning Engine. ISPDC 2015: 74-81 - [c8]David Jaeger, Amir Azodi, Feng Cheng, Christoph Meinel:
Normalizing Security Events with a Hierarchical Knowledge Base. WISTP 2015: 237-248 - 2014
- [c7]Amir Azodi, David Jaeger, Feng Cheng, Christoph Meinel:
Runtime Updatable and Dynamic Event Processing Using Embedded ECMAScript Engines. ICITCS 2014: 1-4 - [c6]David Jaeger, Hendrik Graupner, Andrey Sapegin, Feng Cheng, Christoph Meinel:
Gathering and Analyzing Identity Leaks for Security Awareness. PASSWORDS 2014: 102-115 - 2013
- [c5]Andrey Sapegin, David Jaeger, Amir Azodi, Marian Gawron, Feng Cheng, Christoph Meinel:
Hierarchical object log format for normalisation of security events. IAS 2013: 25-30 - [c4]Amir Azodi, David Jaeger, Feng Cheng, Christoph Meinel:
Pushing the Limits in Event Normalisation to Improve Attack Detection in IDS/SIEM Systems. CBD 2013: 69-76 - [c3]Amir Azodi, David Jaeger, Feng Cheng, Christoph Meinel:
A New Approach to Building a Multi-tier Direct Access Knowledgebase for IDS/SIEM Systems. DASC 2013: 118-123 - [c2]Feng Cheng, Amir Azodi, David Jaeger, Christoph Meinel:
Multi-core Supported High Performance Security Analytics. DASC 2013: 621-626 - [c1]Feng Cheng, Amir Azodi, David Jaeger, Christoph Meinel:
Security Event Correlation Supported by Multi-Core Architecture. ICITCS 2013: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint