Cujo: efficient detection and prevention of drive-by-download attacks K Rieck, T Krueger, A Dewald Proceedings of the 26th Annual Computer Security Applications Conference, 31-39, 2010 | 288 | 2010 |
Regulation of muscle development by DPF3, a novel histone acetylation and methylation reader of the BAF chromatin remodeling complex M Lange, B Kaynak, UB Forster, M Tönjes, JJ Fischer, C Grimm, ... Genes & development 22 (17), 2370-2384, 2008 | 263 | 2008 |
The cardiac transcription network modulated by Gata4, Mef2a, Nkx2. 5, Srf, histone modifications, and microRNAs J Schlesinger, M Schueler, M Grunert, JJ Fischer, Q Zhang, T Krueger, ... PLoS genetics 7 (2), e1001313, 2011 | 251 | 2011 |
Identification of Y-box binding protein 1 as a core regulator of MEK/ERK pathway-dependent gene signatures in colorectal cancer cells K Jürchott, RJ Kuban, T Krech, N Blüthgen, U Stein, W Walther, C Friese, ... PLoS genetics 6 (12), e1001231, 2010 | 100 | 2010 |
Learning stateful models for network honeypots T Krueger, H Gascon, N Krämer, K Rieck Proceedings of the 5th ACM workshop on Security and artificial intelligence …, 2012 | 92 | 2012 |
Combinatorial effects of four histone modifications in transcription and differentiation JJ Fischer, J Toedling, T Krueger, M Schueler, W Huber, S Sperling Genomics 91 (1), 41-51, 2008 | 81 | 2008 |
TokDoc: A self-healing web application firewall T Krueger, C Gehl, K Rieck, P Laskov Proceedings of the 2010 ACM Symposium on Applied Computing, 1846-1853, 2010 | 74 | 2010 |
ASAP: Automatic semantics-aware analysis of network payloads T Krueger, N Krämer, K Rieck International Workshop on Privacy and Security Issues in Data Mining and …, 2010 | 58 | 2010 |
Fast Cross-Validation via Sequential Testing T Krueger, D Panknin, M Braun Journal of Machine Learning Research 16, 1103-1155, 2015 | 56 | 2015 |
Fast cross-validation via sequential testing. T Krueger, D Panknin, ML Braun Journal of Machine Learning Research 16 (1), 1103-55, 2015 | 56 | 2015 |
Analyzing local structure in kernel-based learning: Explanation, complexity, and reliability assessment G Montavon, M Braun, T Krueger, KR Müller Signal Processing Magazine, IEEE 30 (4), 62-74, 2013 | 53 | 2013 |
Approximate tree kernels K Rieck, T Krueger, U Brefeld, KR Müller The Journal of Machine Learning Research 11, 555-580, 2010 | 44 | 2010 |
Autonomous learning for detection of JavaScript attacks: vision or reality? G Schwenk, A Bikadorov, T Krueger, K Rieck Proceedings of the 5th ACM workshop on Security and artificial intelligence …, 2012 | 22 | 2012 |
Intelligent defense against malicious javascript code T Krueger, K Rieck PIK-Praxis der Informationsverarbeitung und Kommunikation 35 (1), 54-60, 2012 | 17 | 2012 |
An architecture for inline anomaly detection T Krueger, C Gehl, K Rieck, P Laskov 2008 European Conference on Computer Network Defense, 11-18, 2008 | 17 | 2008 |
Approximate kernels for trees K Rieck, T Krueger, U Brefeld | 9 | 2008 |
Privacy-Enhanced Fraud Detection with Bloom Filters D Arp, E Quiring, T Krueger, S Dragiev, K Rieck Security and Privacy in Communication Networks: 14th International …, 2018 | 7 | 2018 |
Fast Cross-Validation via Sequential Analysis T Krueger, D Panknin, M Braun | 3* | |
Fips: First intrusion prevention system I Schuster, T Krueger, C Gehl, K Rieck, P Laskov Technical Report 1, Fraunhofer FIRST, 2010. URL http://publica. fraunhofer …, 0 | 2* | |
Probabilistic Methods for Network Security. From Analysis to Response T Krueger Universitätsbibliothek, 2013 | 1 | 2013 |