default search action
Ulrich Flegel
Person information
- affiliation: Technical University of Dortmund, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c24]Patrick Düssel, Shoufu Luo, Ulrich Flegel, Sven Dietrich, Michael Meier:
Tracing Privilege Misuse Through Behavioral Anomaly Detection in Geometric Spaces. SADFE 2020: 22-31
2010 – 2019
- 2017
- [j8]Patrick Düssel, Christian Gehl, Ulrich Flegel, Sven Dietrich, Michael Meier:
Detecting zero-day attacks using context-aware anomaly detection at the application-layer. Int. J. Inf. Sec. 16(5): 475-490 (2017) - 2013
- [e3]Ulrich Flegel, Evangelos P. Markatos, William K. Robertson:
Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7591, Springer 2013, ISBN 978-3-642-37299-5 [contents] - 2012
- [j7]Ulrich Flegel:
Reactive Security. it Inf. Technol. 54(2): 51-52 (2012) - [j6]Ulrich Flegel, Michael Meier:
Modeling and Describing Misuse Scenarios Using Signature-Nets and Event Description Language. it Inf. Technol. 54(2): 71-81 (2012) - [c23]Ganna Monakova, Cristina Severin, Achim D. Brucker, Ulrich Flegel, Andreas Schaad:
Monitoring Security and Safety of Assets in Supply Chains. Future Security 2012: 9-20 - 2011
- [c22]Asadul K. Islam, Malcolm Corney, George M. Mohay, Andrew J. Clark, Shane Bracher, Tobias Raub, Ulrich Flegel:
Detecting Collusive Fraud in Enterprise Resource Planning Systems. IFIP Int. Conf. Digital Forensics 2011: 143-153 - 2010
- [c21]Ulrich Flegel:
Privacy Compliant Internal Fraud Screening. ISSE 2010: 191-199 - [c20]Ulrich Flegel, Johannes Hoffmann, Michael Meier:
Cooperation enablement for centralistic early warning systems. SAC 2010: 2001-2008 - [c19]Asadul K. Islam, Malcolm Corney, George M. Mohay, Andrew J. Clark, Shane Bracher, Tobias Raub, Ulrich Flegel:
Fraud Detection in ERP Systems Using Scenario Matching. SEC 2010: 112-123 - [p2]Ulrich Flegel, Julien Vayssière, Gunter Bitz:
A State of the Art Survey of Fraud Detection Technology. Insider Threats in Cyber Security 2010: 73-84 - [p1]Ulrich Flegel, Florian Kerschbaum, Philip Miseldine, Ganna Monakova, Richard Wacker, Frank Leymann:
Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection. Insider Threats in Cyber Security 2010: 139-171
2000 – 2009
- 2009
- [j5]Ulrich Flegel, Oliver Raabe, Richard Wacker:
Technischer Datenschutz für IDS und FDS durch Pseudonymisierung. Datenschutz und Datensicherheit 33(12): 735-741 (2009) - [j4]Ulrich Flegel, Eric Filiol:
Editorial. J. Comput. Virol. 5(2): 89 (2009) - [c18]Luca Compagna, Ulrich Flegel, Volkmar Lotz:
Towards Validating Security Protocol Deployment in the Wild. COMPSAC (2) 2009: 434-438 - [c17]Martin Apel, Joachim Biskup, Ulrich Flegel, Michael Meier:
Towards Early Warning Systems - Challenges, Technologies and Architecture. CRITIS 2009: 151-164 - [e2]Ulrich Flegel, Danilo Bruschi:
Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings. Lecture Notes in Computer Science 5587, Springer 2009, ISBN 978-3-642-02917-2 [contents] - 2008
- [c16]Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier, René Rietz:
Systematic Signature Engineering by Re-use of Snort Signatures. ACSAC 2008: 23-32 - [c15]Philip Miseldine, Ulrich Flegel, Andreas Schaad:
Supporting Evidence-Based Compliance Evaluation for Partial Business Process Outsourcing Scenarios. RELAW 2008: 31-34 - [c14]Khaled Gaaloul, Andreas Schaad, Ulrich Flegel, François Charoy:
A Secure Task Delegation Model for Workflows. SECURWARE 2008: 10-15 - [i3]Marc Dacier, Ulrich Flegel, Ralph Holz, Norbert Luttenberger:
08102 Working Group -- Intrusion and Fraud Detection for Web Services. Network Attack Detection and Defense 2008 - [i2]Ulrich Flegel, Florian Kerschbaum, Richard Wacker:
Collaborative Fraud Detection in Outsourcing Scenarios: Issues of and Solutions for Privacy and Confidentiality. Countering Insider Threats 2008 - [i1]Ulrich Flegel, Julien Vayssière, Gunter Bitz:
Fraud Detection from a Business Perspective: Future Directions and Challenges. Countering Insider Threats 2008 - 2007
- [b2]Ulrich Flegel:
Privacy-Respecting Intrusion Detection. Advances in Information Security 35, Springer 2007, ISBN 978-0-387-34346-4, pp. 1-307 - [c13]Michael Meier, Ulrich Flegel, Sebastian Schmerl:
Efficiency Issues of Rete-Based Expert Systems for Misuse Detection. ACSAC 2007: 151-160 - [c12]Ulrich Flegel, Michael Meier:
Authorization Architectures for Privacy-Respecting Surveillance. EuroPKI 2007: 1-17 - 2006
- [c11]Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier:
Simplifying Signature Engineering by Reuse. ETRICS 2006: 436-450 - [c10]Ulrich Flegel, Joachim Biskup:
Requirements of Information Reductions for Cooperating Intrusion Detection Agents. ETRICS 2006: 466-480 - [c9]Sebastian Schmerl, Ulrich Flegel, Michael Meier:
Vereinfachung der Signaturentwicklung durch Wiederverwendung. Sicherheit 2006: 201-212 - 2005
- [b1]Ulrich Flegel:
Pseudonymizing audit data for privacy respecting misuse detection. Dortmund University of Technology, 2005, pp. 1-407 - [c8]Ulrich Flegel:
Evaluating the Design of an Audit Data Pseudonymizer Using Basic Building Blocks for Anonymity. Sicherheit 2005: 221-232 - 2004
- [j3]Michael Meier, Ulrich Flegel, Hartmut König:
Reactive Security - Intrusion Detection, Honeypots, and Vulnerability Assessment. Prax. Inf.verarb. Kommun. 27(4): 186-187 (2004) - [e1]Ulrich Flegel, Michael Meier:
Detection of Intrusions and Malware & Vulnerability Assessment, GI SIG SIDAR Workshop, DIMVA 2004, Dortmund, Germany, July 6.7, 2004, Proceedings. LNI P-46, GI 2004, ISBN 3-88579-375-X [contents] - 2003
- [j2]Ulrich Flegel:
Anonyme Audit-Daten im Überblick - Architekturen für anonyme Autorisierungen und Audit-Daten. Datenschutz und Datensicherheit 27(5) (2003) - [j1]Christian Altenschmidt, Joachim Biskup, Ulrich Flegel, Yücel Karabulut:
Secure Mediation: Requirements, Design, and Architecture. J. Comput. Secur. 11(3): 365-398 (2003) - [c7]Ulrich Flegel:
Ein Architektur-Modell für anonyme Autorisierungen und Überwachungsdaten. GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit") 2003: 293-304 - 2002
- [c6]Joachim Biskup, Ulrich Flegel:
Ausgleich von Datenschutz und Überwachung mit technischer Zweckbindung am Beispiel eines Pseudonymisierers. GI Jahrestagung 2002: 488-494 - [c5]Ulrich Flegel:
Pseudonymizing Unix Log Files. InfraSec 2002: 162-179 - 2000
- [c4]Joachim Biskup, Ulrich Flegel:
Threshold-based identity recovery for privacy enhanced applications. CCS 2000: 71-79 - [c3]Joachim Biskup, Ulrich Flegel:
On Pseudonymization of Audit Data for Intrusion Detection. Workshop on Design Issues in Anonymity and Unobservability 2000: 161-180 - [c2]Joachim Biskup, Ulrich Flegel:
Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection. Recent Advances in Intrusion Detection 2000: 28-48
1990 – 1999
- 1998
- [c1]Joachim Biskup, Ulrich Flegel, Yücel Karabulut:
Secure Mediation: Requirements and Design. DBSec 1998: 127-140
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint