default search action
Marc Ph. Stoecklin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c22]Ian M. Molloy, Josyula R. Rao, Marc Ph. Stoecklin:
AI vs. AI: Exploring the Intersections of AI and Cybersecurity. IWSPA@CODASPY 2021: 1 - [i1]Elli Androulaki, Ilie Circiumaru, Jesus Diaz Vico, Miguel Prada, Alessandro Sorniotti, Marc Ph. Stoecklin, Marko Vukolic, Marie Wallace:
IBM Digital Health Pass Whitepaper: A Privacy-Respectful Platform for Proving Health Status. IACR Cryptol. ePrint Arch. 2021: 704 (2021) - 2020
- [c21]Jialong Zhang, Zhongshu Gu, Jiyong Jang, Dhilung Kirat, Marc Ph. Stoecklin, Xiaokui Shu, Heqing Huang:
Scarecrow: Deactivating Evasive Malware via Its Own Evasive Logic. DSN 2020: 76-87
2010 – 2019
- 2018
- [c20]Jialong Zhang, Zhongshu Gu, Jiyong Jang, Hui Wu, Marc Ph. Stoecklin, Heqing Huang, Ian M. Molloy:
Protecting Intellectual Property of Deep Neural Networks with Watermarking. AsiaCCS 2018: 159-172 - [c19]Xiaokui Shu, Frederico Araujo, Douglas Lee Schales, Marc Ph. Stoecklin, Jiyong Jang, Heqing Huang, Josyula R. Rao:
Threat Intelligence Computing. CCS 2018: 1883-1898 - [c18]Marc Ph. Stoecklin, Jialong Zhang, Frederico Araujo, Teryl Taylor:
Dressed up: Baiting Attackers through Endpoint Service Projection. SDN-NFV@CODASPY 2018: 23-28 - [c17]Teryl Taylor, Frederico Araujo, Anne Kohlbrenner, Marc Ph. Stoecklin:
Hidden in Plain Sight: Filesystem View Separation for Data Integrity and Deception. DIMVA 2018: 256-278 - [c16]Frederico Araujo, Teryl Taylor, Jialong Zhang, Marc Ph. Stoecklin:
Cross-Stack Threat Sensing for Cyber Security and Resilience. DSN Workshops 2018: 18-21 - [c15]Jialong Zhang, Jiyong Jang, Guofei Gu, Marc Ph. Stoecklin, Xin Hu:
Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence. RAID 2018: 467-489 - 2017
- [c14]Anne Kohlbrenner, Frederico Araujo, Teryl Taylor, Marc Ph. Stoecklin:
POSTER: Hidden in Plain Sight: A Filesystem for Data Integrity and Confidentiality. CCS 2017: 2523-2525 - 2016
- [j11]Josyula R. Rao, Suresh Chari, Dimitrios E. Pendarakis, Reiner Sailer, Marc Ph. Stoecklin, Wilfried Teiken, Andreas Wespi:
Security 360°: Enterprise security for the cognitive era. IBM J. Res. Dev. 60(4): 1 (2016) - [j10]Douglas Lee Schales, Jiyong Jang, Ting Wang, Xin Hu, Dhilung Kirat, B. Wuest, Marc Ph. Stoecklin:
Scalable analytics to detect DNS misuse for establishing stealthy communication channels. IBM J. Res. Dev. 60(4): 3 (2016) - [j9]Xin Hu, Jiyong Jang, Ting Wang, Zubair Ashraf, Marc Ph. Stoecklin, Dhilung Kirat:
Scalable malware classification with multifaceted content features and threat intelligence. IBM J. Res. Dev. 60(4): 6 (2016) - [j8]Marc Ph. Stoecklin, Kapil Singh, Larry Koved, Xin Hu, Suresh N. Chari, Josyula R. Rao, Pau-Chen Cheng, Mihai Christodorescu, Reiner Sailer, Douglas Lee Schales:
Passive security intelligence to analyze the security risks of mobile/BYOD activities. IBM J. Res. Dev. 60(4): 9 (2016) - [j7]Stefan Berger, Yangyi Chen, Xin Hu, Dimitrios E. Pendarakis, Josyula R. Rao, Reiner Sailer, Douglas Lee Schales, Marc Ph. Stoecklin:
Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibility. IBM J. Res. Dev. 60(4): 10 (2016) - [j6]A. Amrein, V. Angeletti, Anton Beitler, M. Német, M. Reiser, S. Riccetti, Marc Ph. Stoecklin, Andreas Wespi:
Security intelligence for industrial control systems. IBM J. Res. Dev. 60(4): 13 (2016) - [c13]Teryl Taylor, Xin Hu, Ting Wang, Jiyong Jang, Marc Ph. Stoecklin, Fabian Monrose, Reiner Sailer:
Detecting Malicious Exploit Kits using Tree-based Similarity Searches. CODASPY 2016: 255-266 - [c12]Xin Hu, Jiyong Jang, Marc Ph. Stoecklin, Ting Wang, Douglas Lee Schales, Dhilung Kirat, Josyula R. Rao:
BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks. DSN 2016: 479-490 - [c11]Ting Wang, Xin Hu, Jiyong Jang, Shouling Ji, Marc Ph. Stoecklin, Teryl Taylor:
BotMeter: Charting DGA-Botnet Landscapes in Large Networks. ICDCS 2016: 334-343 - [c10]Jialong Zhang, Xin Hu, Jiyong Jang, Ting Wang, Guofei Gu, Marc Ph. Stoecklin:
Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysis. INFOCOM 2016: 1-9 - 2015
- [c9]Douglas Lee Schales, Xin Hu, Jiyong Jang, Reiner Sailer, Marc Ph. Stoecklin, Ting Wang:
FCCE: Highly scalable distributed Feature Collection and Correlation Engine for low latency big data analytics. ICDE 2015: 1316-1327 - 2014
- [j5]Xin Hu, Ting Wang, Marc Ph. Stoecklin, Douglas Lee Schales, Jiyong Jang, Reiner Sailer:
MUSE: asset risk scoring in enterprise network with mutually reinforced reputation propagation. EURASIP J. Inf. Secur. 2014: 17 (2014) - [c8]Douglas Lee Schales, Mihai Christodorescu, Xin Hu, Jiyong Jang, Josyula R. Rao, Reiner Sailer, Marc Ph. Stoecklin, Wietse Z. Venema, Ting Wang:
Stream computing for large-scale, multi-channel cyber threat analytics. IRI 2014: 8-15 - [c7]Xin Hu, Ting Wang, Marc Ph. Stoecklin, Douglas Lee Schales, Jiyong Jang, Reiner Sailer:
Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation. IEEE Symposium on Security and Privacy Workshops 2014: 61-64 - 2013
- [c6]Vern Paxson, Mihai Christodorescu, Mobin Javed, Josyula R. Rao, Reiner Sailer, Douglas Lee Schales, Marc Ph. Stoecklin, Kurt Thomas, Wietse Z. Venema, Nicholas Weaver:
Practical Comprehensive Bounds on Surreptitious Communication over DNS. USENIX Security Symposium 2013: 17-32 - 2012
- [j4]Francesco Fusco, Michail Vlachos, Marc Ph. Stoecklin:
Real-time creation of bitmap indexes on streaming network data. VLDB J. 21(3): 287-307 (2012) - 2011
- [b1]Marc Ph. Stoecklin:
Traffic Anomaly Detection and Diagnosis on the Network Flow Level. EPFL, Switzerland, 2011 - 2010
- [j3]Francesco Fusco, Marc Ph. Stoecklin, Michail Vlachos:
Net-Fli: On-the-fly Compression, Archiving and Indexing of Streaming Network Traffic. Proc. VLDB Endow. 3(2): 1382-1393 (2010) - [c5]Peter Siska, Marc Ph. Stoecklin, Andreas Kind, Torsten Braun:
A flow trace generator using graph-based traffic classification techniques. IWCMC 2010: 457-462
2000 – 2009
- 2009
- [j2]Andreas Kind, Marc Ph. Stoecklin, Xenofontas A. Dimitropoulos:
Histogram-based traffic anomaly detection. IEEE Trans. Netw. Serv. Manag. 6(2): 110-121 (2009) - [c4]Xenofontas A. Dimitropoulos, Paul Hurley, Andreas Kind, Marc Ph. Stoecklin:
On the 95-Percentile Billing Method. PAM 2009: 207-216 - 2008
- [j1]Xenofontas A. Dimitropoulos, Marc Ph. Stoecklin, Paul Hurley, Andreas Kind:
The eternal sunshine of the sketch data structure. Comput. Networks 52(17): 3248-3257 (2008) - [c3]Marc Ph. Stoecklin, Jean-Yves Le Boudec, Andreas Kind:
A Two-Layered Anomaly Detection Technique Based on Multi-modal Flow Behavior Models. PAM 2008: 212-221 - 2006
- [c2]Marc Ph. Stoecklin:
Anomaly detection by finding feature distribution outliers. CoNEXT 2006: 32 - [c1]Frederik Armknecht, Joao Girão, Marc Ph. Stoecklin, Dirk Westhoff:
Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks. ESAS 2006: 18-31
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint