Follow
Rafael Uetz
Title
Cited by
Cited by
Year
Large-scale object recognition with CUDA-accelerated hierarchical neural networks
R Uetz, S Behnke
IEEE International Conference on Intelligent Computing and Intelligent …, 2009
1172009
Software vulnerability analysis using CPE and CVE
LAB Sanguino, R Uetz
arXiv preprint arXiv:1705.05347, 2017
29*2017
Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments
R Uetz, C Hemminghaus, L Hackländer, P Schlipper, M Henze
Annual Computer Security Applications Conference (ACSAC), 2021
19*2021
Recognizing Email Spam from Meta Data only
T Krause, R Uetz, T Kretschmann
IEEE Conference on Communications and Network Security (CNS), 2019
132019
Locally-connected hierarchical neural networks for GPU-accelerated object recognition
R Uetz, S Behnke
NIPS 2009 Workshop on Large-Scale Machine Learning, 2009
132009
BREACH: A Framework for the Simulation of Cyber Attacks on Company‘s Networks
R Uetz, L Benthin, C Hemminghaus, S Krebs, T Yilmaz
Digital Forensics Research Conference Europe (DFRWS EU), 2017
52017
Resurrection: a carver for fragmented files
M Lambertz, R Uetz, E Gerhards-Padilla
International Conference on Digital Forensics and Cyber Crime (ICDF2C), 2013
22013
You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks
R Uetz, M Herzog, L Hackländer, S Schwarz, M Henze
USENIX Security Symposium (USENIX Security), 2024
2024
Detecting Breaches and Other Cyber Attacks with a Fuzzy Streaming Algorithm Based on the Intrusion Kill Chain Model
R Uetz
Graduate Workshop of the Special Interest Group Security – Intrusion …, 2017
2017
Simulation and Detection of Network Breaches
R Uetz
Graduate Workshop of the Special Interest Group Security – Intrusion …, 2016
2016
File carving for fragmented JPEG files
M Lambertz, R Uetz, E Gerhards-Padilla
Future Security, 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–11