default search action
Michael Meier 0001
Person information
- affiliation: University of Bonn, Institute of Computer Science
- affiliation: Dortmund University of Technology, Department of Computer Science
- affiliation: Brandenburg University of Technology, Computer Science Department
Other persons with the same name
- Michael Meier — disambiguation page
- Michael Meier 0002 — University of Freiburg, Department of Computer Science
- Michael Meier 0003 — vasp Datatecture GmbH, Switzerland
- Michael Meier 0004 — IBM Scientific Center, Palo Alto, CA, USA
- Michael Meier 0005 — University of Paderborn
- Michael Meier 0006 — University of Erlangen-Nuremberg, Erlangen Regional Computing Center
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c52]Ben Swierzy, Felix Boes, Timo Pohl, Christian Bungartz, Michael Meier:
SoK: Automated Software Testing for TLS Libraries. ARES 2024: 54:1-54:12 - [c51]Marc Ohm, Christian Bungartz, Felix Boes, Michael Meier:
Assessing the Impact of Large Language Models on Cybersecurity Education: A Study of ChatGPT's Influence on Student Performance. ARES 2024: 104:1-104:7 - [c50]Christian Bungartz, Felix Boes, Michael Meier, Marc Ohm:
Towards Robust, Explainable, and Privacy-Friendly Sybil Detection. AISec@CCS 2024: 161-172 - [c49]Maximilian Leiwig, Ben Swierzy, Christian Bungartz, Michael Meier:
Analyzing the Potency of Pretrained Transformer Models for Automated Program Repair. SEAA 2024: 72-79 - [c48]Ben Swierzy, Melina Hoffmann, Felix Boes, Felix Betke, Lennart Hein, Maxim Shevchishin, Jan-Niklas Sohn, Michael Meier:
TEEM: A CPU Emulator for Teaching Transient Execution Attacks. Sicherheit 2024: 203-214 - [c47]Timo Pohl, Marc Ohm, Felix Boes, Michael Meier:
You Can Run But You Can't Hide: Runtime Protection Against Malicious Package Updates For Node.js. Sicherheit 2024: 231-241 - [c46]Daniel Vogel, Felix Viola, Nicholas Malte Kreimeyer, Michael Meier:
I Know you were here: Leveraging Probe Request Templates for Identifying Wi-Fi Devices. WiMob 2024: 429-436 - 2023
- [c45]Daniel Vogel, Markus Krämer, Ben Swierzy, Daniel Meyer, Michael Meier:
On the Feasibility of Detecting Non-Cooperative Wi-Fi Devices via a Single Wi-Fi-Router. IPIN-WiP 2023 - [c44]Ben Swierzy, Markus Krämer, Daniel Vogel, Daniel Meyer, Michael Meier:
Analyzing the Feasibility of Privacy-Respecting Automated Tracking of Devices Fleeing a Burglary. WiMob 2023: 452-459 - 2022
- [c43]Marc Ohm, Felix Boes, Christian Bungartz, Michael Meier:
On the Feasibility of Supervised Machine Learning for the Detection of Malicious Software Packages. ARES 2022: 127:1-127:10 - 2021
- [j7]Jakob Greis, Artem Yushchenko, Daniel Vogel, Michael Meier, Volker Steinhage:
Automated identification of vulnerable devices in networks using traffic data and deep learning. Int. J. Inf. Priv. Secur. Integr. 5(1): 1-17 (2021) - [i7]Jakob Greis, Artem Yushchenko, Daniel Vogel, Michael Meier, Volker Steinhage:
Automated Identification of Vulnerable Devices in Networks using Traffic Data and Deep Learning. CoRR abs/2102.08199 (2021) - 2020
- [c42]Marc Ohm, Arnold Sykosch, Michael Meier:
Towards detection of software supply chain attacks by forensic artifacts. ARES 2020: 65:1-65:6 - [c41]Daniel Vogel, Ulugbek Akhmedjanov, Marc Ohm, Michael Meier:
An investigation on the feasibility of the bluetooth frequency hopping mechanism for the use as a covert channel technique. ARES 2020: 70:1-70:10 - [c40]Arnold Sykosch, Christian Doll, Matthias Wübbeling, Michael Meier:
Generalizing the phishing principle: analyzing user behavior in response to controlled stimuli for IT security awareness assessment. ARES 2020: 88:1-88:10 - [c39]Marc Ohm, Henrik Plate, Arnold Sykosch, Michael Meier:
Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks. DIMVA 2020: 23-43 - [c38]Saffija Kasem-Madani, Timo Malderle, Felix Boes, Michael Meier:
Privacy-Preserving Warning Management for an Identity Leakage Warning Network. EICC 2020: 4:1-4:6 - [c37]Timo Malderle, Sven Knauer, Martin Lang, Matthias Wübbeling, Michael Meier:
Track Down Identity Leaks using Threat Intelligence. ICISSP 2020: 96-106 - [c36]Timo Malderle, Felix Boes, Gina Muuss, Matthias Wübbeling, Michael Meier:
Credential Intelligence Agency: A Threat Intelligence Approach to Mitigate Identity Theft. ICISSP (Revised Selected Papers) 2020: 115-138 - [c35]Patrick Düssel, Shoufu Luo, Ulrich Flegel, Sven Dietrich, Michael Meier:
Tracing Privilege Misuse Through Behavioral Anomaly Detection in Geometric Spaces. SADFE 2020: 22-31 - [c34]Saffija Kasem-Madani, Michael Meier:
Utility Requirement Description for Utility-Preserving and Privacy-Respecting Data Pseudonymization. TrustBus 2020: 171-185 - [i6]Marc Ohm, Henrik Plate, Arnold Sykosch, Michael Meier:
Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks. CoRR abs/2005.09535 (2020) - [i5]Marc Ohm, Lukas Kempf, Felix Boes, Michael Meier:
If You've Seen One, You've Seen Them All: Leveraging AST Clustering Using MCL to Mimic Expertise to Detect Software Supply Chain Attacks. CoRR abs/2011.02235 (2020)
2010 – 2019
- 2019
- [c33]Christian Doll, Arnold Sykosch, Marc Ohm, Michael Meier:
Automated Pattern Inference Based on Repeatedly Observed Malware Artifacts. ARES 2019: 82:1-82:10 - 2018
- [c32]Arnold Sykosch, Marc Ohm, Michael Meier:
Hunting Observable Objects for Indication of Compromise. ARES 2018: 59:1-59:8 - [c31]Timo Malderle, Matthias Wübbeling, Sven Knauer, Arnold Sykosch, Michael Meier:
Gathering and analyzing identity leaks for a proactive warning of affected users. CF 2018: 208-211 - [c30]Timo Malderle, Matthias Wübbeling, Michael Meier:
Sammlung geleakter Identitätsdaten zur Vorbereitung proaktiver Opfer-Warnung. MKWI 2018: 1381-1393 - [c29]Timo Malderle, Matthias Wübbeling, Sven Knauer, Michael Meier:
Ein Werkzeug zur automatisierten Analyse von Identitätsdaten-Leaks. Sicherheit 2018: 43-54 - [c28]Timo Malderle, Matthias Wübbeling, Sven Knauer, Michael Meier:
Warning of Affected Users About an Identity Leak. SoCPaR 2018: 278-287 - [e5]Hanno Langweg, Michael Meier, Bernhard C. Witt, Delphine Reinhardt:
Sicherheit 2018, Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 25.-27.4.2018, Konstanz. LNI P-281, Gesellschaft für Informatik e.V. 2018, ISBN 978-3-88579-675-6 [contents] - 2017
- [j6]Patrick Düssel, Christian Gehl, Ulrich Flegel, Sven Dietrich, Michael Meier:
Detecting zero-day attacks using context-aware anomaly detection at the application-layer. Int. J. Inf. Sec. 16(5): 475-490 (2017) - [c27]Saffija Kasem-Madani, Michael Meier, Martin Wehner:
Towards a Toolkit for Utility and Privacy-Preserving Transformation of Semi-structured Data Using Data Pseudonymization. DPM/CBT@ESORICS 2017: 163-179 - [c26]Matthias Wübbeling, Michael Meier:
Reclaim Your Prefix: Mitigation of Prefix Hijacking Using IPsec Tunnels. LCN 2017: 330-338 - [e4]Michalis Polychronakis, Michael Meier:
Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings. Lecture Notes in Computer Science 10327, Springer 2017, ISBN 978-3-319-60875-4 [contents] - 2016
- [j5]Jaspreet Kaur, Steffen Wendzel, Omar Eissa, Jernej Tonejc, Michael Meier:
Covert channel-internal control protocols: attacks and defense. Secur. Commun. Networks 9(15): 2986-2997 (2016) - [c25]Matthias Wübbeling, Michael Meier:
Improved Calculation of aS Resilience against IP Prefix Hijacking. LCN Workshops 2016: 121-128 - [e3]Michael Meier, Delphine Reinhardt, Steffen Wendzel:
Sicherheit 2016: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-7. April 2016, Bonn. LNI P-256, GI 2016, ISBN 978-3-88579-650-3 [contents] - 2015
- [c24]Jaspreet Kaur, Steffen Wendzel, Michael Meier:
Countermeasures for Covert Channel-Internal Control Protocols. ARES 2015: 422-428 - [c23]Christoph Pohl, Alf Zugenmaier, Michael Meier, Hans-Joachim Hof:
B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications. SEC 2015: 267-280 - [c22]Jaspreet Kaur, Jernej Tonejc, Steffen Wendzel, Michael Meier:
Securing BACnet's Pitfalls. SEC 2015: 616-629 - [i4]Christoph Pohl, Michael Meier, Hans-Joachim Hof:
Apate - A Linux Kernel Module for High Interaction Honeypots. CoRR abs/1507.03117 (2015) - [i3]Saffija Kasem-Madani, Michael Meier:
Security and Privacy Policy Languages: A Survey, Categorization and Gap Identification. CoRR abs/1512.00201 (2015) - 2014
- [c21]Matthias Wübbeling, Till Elsner, Michael Meier:
Inter-AS routing anomalies: Improved detection and classification. CyCon 2014: 223-238 - [c20]Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Michael Meier:
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats. ISSE 2014: 123-133 - [c19]Viviane Zwanger, Elmar Gerhards-Padilla, Michael Meier:
Codescanner: Detecting (Hidden) x86/x64 code in arbitrary files. MALWARE 2014: 118-127 - [c18]Steffen Wendzel, Viviane Zwanger, Michael Meier, Sebastian Szlósarczyk:
Envisioning Smart Building Botnets. Sicherheit 2014: 319-329 - [c17]Sebastian Szlósarczyk, Steffen Wendzel, Jaspreet Kaur, Michael Meier, Frank Schubert:
Towards Suppressing Attacks on and Improving Resilience of Building Automation Systems - an Approach Exemplified Using BACnet. Sicherheit 2014: 407-418 - [i2]Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Michael Meier:
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats. CoRR abs/1407.2029 (2014) - 2012
- [j4]Ulrich Flegel, Michael Meier:
Modeling and Describing Misuse Scenarios Using Signature-Nets and Event Description Language. it Inf. Technol. 54(2): 71-81 (2012) - [j3]Martin Apel, Michael Meier:
Generalizing Behavioral Signatures for Detecting Unknown Malware Variants and Early Warning. Prax. Inf.verarb. Kommun. 35(1): 17-24 (2012) - [e2]Nils Aschenbruck, Peter Martini, Michael Meier, Jens Tölle:
Future Security - 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4-6, 2012. Proceedings. Communications in Computer and Information Science 318, Springer 2012, ISBN 978-3-642-33160-2 [contents] - 2010
- [c16]Armin Büscher, Michael Meier, Ralf Benzmüller:
Throwing a MonkeyWrench into Web Attackers Plans. Communications and Multimedia Security 2010: 28-39 - [c15]Ulrich Flegel, Johannes Hoffmann, Michael Meier:
Cooperation enablement for centralistic early warning systems. SAC 2010: 2001-2008
2000 – 2009
- 2009
- [c14]Martin Apel, Joachim Biskup, Ulrich Flegel, Michael Meier:
Towards Early Warning Systems - Challenges, Technologies and Architecture. CRITIS 2009: 151-164 - [c13]Christian Bockermann, Martin Apel, Michael Meier:
Learning SQL for Database Intrusion Detection Using Context-Sensitive Modelling (Extended Abstract). DIMVA 2009: 196-205 - [c12]Martin Apel, Christian Bockermann, Michael Meier:
Measuring similarity of malware behavior. LCN 2009: 891-898 - [c11]Christian Bockermann, Martin Apel, Michael Meier:
Learning SQL for Database Intrusion Detection using Context-Sensitive Modelling. LWA 2009: KDML:17-21 - 2008
- [c10]Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier, René Rietz:
Systematic Signature Engineering by Re-use of Snort Signatures. ACSAC 2008: 23-32 - [i1]Joachim Biskup, Bernhard M. Hämmerli, Michael Meier, Sebastian Schmerl, Jens Tölle, Michael Vogel:
08102 Working Group -- Early Warning Systems. Network Attack Detection and Defense 2008 - 2007
- [b1]Michael Meier:
Intrusion detection effektiv! - Modellierung und Analyse von Angriffsmustern. Brandenburg University of Technology, 2007, ISBN 978-3-540-48251-2, pp. 1-209 - [c9]Michael Meier, Ulrich Flegel, Sebastian Schmerl:
Efficiency Issues of Rete-Based Expert Systems for Misuse Detection. ACSAC 2007: 151-160 - [c8]Ulrich Flegel, Michael Meier:
Authorization Architectures for Privacy-Respecting Surveillance. EuroPKI 2007: 1-17 - 2006
- [c7]Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier:
Simplifying Signature Engineering by Reuse. ETRICS 2006: 436-450 - [c6]Sebastian Schmerl, Ulrich Flegel, Michael Meier:
Vereinfachung der Signaturentwicklung durch Wiederverwendung. Sicherheit 2006: 201-212 - 2005
- [c5]Michael Meier, Sebastian Schmerl, Hartmut König:
Improving the Efficiency of Misuse Detection. DIMVA 2005: 188-205 - [c4]Michael Meier, Sebastian Schmerl:
Effiziente Analyseverfahren für Intrusion-Detection-Systeme. Sicherheit 2005: 209-220 - 2004
- [j2]Michael Meier, Ulrich Flegel, Hartmut König:
Reactive Security - Intrusion Detection, Honeypots, and Vulnerability Assessment. Prax. Inf.verarb. Kommun. 27(4): 186-187 (2004) - [c3]Michael Meier:
A Model for the Semantics of Attack Signatures in Misuse Detection Systems. ISC 2004: 158-169 - [e1]Ulrich Flegel, Michael Meier:
Detection of Intrusions and Malware & Vulnerability Assessment, GI SIG SIDAR Workshop, DIMVA 2004, Dortmund, Germany, July 6.7, 2004, Proceedings. LNI P-46, GI 2004, ISBN 3-88579-375-X [contents] - 2003
- [c2]Thomas Holz, Michael Meier, Hartmut König:
High-Efficient Intrusion Detection Infrastructure. DFN-Arbeitstagung über Kommunikationsnetze 2003: 217-232 - 2002
- [j1]Thomas Holz, Michael Meier, Hartmut König:
Bausteine für effiziente Intrusion-Detection-Systeme. Prax. Inf.verarb. Kommun. 25(3): 144-157 (2002) - [c1]Michael Meier, Niels Bischof, Thomas Holz:
SHEDEL-A Simple Hierarchical Event Description Language for Specifying Attack Signatures. SEC 2002: 559-572
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint