Name
Affiliation
Papers
CLAUDIA ECKERT
Tech Univ Darmstadt, Darmstadt, Germany
31
Collaborators
Citations 
PageRank 
44
288
18.48
Referers 
Referees 
References 
830
801
392
Search Limit
100830
Title
Citations
PageRank
Year
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables.80.482018
Support vector machines under adversarial label contamination351.062015
Is Feature Selection Secure against Training Data Poisoning?200.662015
Dynamic hooks: hiding control flow changes within non-control data90.472014
SobTrA: a software-based trust anchor for ARM cortex application processors20.382014
Persistent Data-only Malware: Function Hooks without Code.180.662014
Identities for Embedded Systems Enabled by Physical Unclonable Functions.20.422013
Indicative Support Vector Clustering with Its Application on Anomaly Detection00.342013
Learning from Multiple Observers with Unknown Expertise.60.502013
Leveraging String Kernels for Malware Detection.50.502013
Improving Mobile Device Security with Operating System-Level Virtualization.70.552013
Practical information-flow aware middleware for in-car communication40.402013
OPARS: objective photo aesthetics ranking system00.342013
Lazy Gaussian Process Committee for Real-Time Online Regression.50.602013
Middleware-based Security for Hyperconnected Applications in Future In-Car Networks.00.342013
X-TIER: Kernel Module Injection.40.432013
Adversarial Label Flips Attack on Support Vector Machines.200.882012
Actively Learning Probabilistic Subsequential Transducers.00.342012
Automotive Proxy-Based Security Architecture for CE Device Integration.50.582012
Towards secure fieldbus communication00.342012
Sicherheit im Smart Grid - Herausforderungen und Handlungsempfehlungen.00.342011
Nitro: hardware-based system call tracing for virtual machines401.452011
T-CUP: A TPM-Based Code Update Protocol Enabling Attestations for Sensor Networks.00.342011
A universal semantic bridge for virtual machine introspection30.392011
Exploiting the x86 Architecture to Derive Virtual Machine State Information80.682010
Grammatical Inference Algorithms in MATLAB50.502010
Improving the quality of ring oscillator PUFs on FPGAs301.412010
A formal model for virtual machine introspection341.172009
Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques140.982008
Towards Secure E-Commerce Based on Virtualization and Attestation Techniques20.492008
Erzeugung elektronischer Signaturen mittels Trusted Platform Module20.462007