Name
Papers
Collaborators
REINER SAILER
41
70
Citations 
PageRank 
Referers 
1908
143.12
3169
Referees 
References 
769
431
Search Limit
1001000
Title
Citations
PageRank
Year
Passive security intelligence to analyze the security risks of mobile/BYOD activities.00.342016
Security 360°: Enterprise security for the cognitive era.00.342016
Detecting Malicious Exploit Kits using Tree-based Similarity Searches.90.542016
Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibility.00.342016
FCCE: Highly scalable distributed Feature Collection and Correlation Engine for low latency big data analytics30.452015
Stream computing for large-scale, multi-channel cyber threat analytics20.372014
Reconciling malware labeling discrepancy via consensus learning00.342014
MUSE: asset risk scoring in enterprise network with mutually reinforced reputation propagation.20.412014
Kaleido: Network Traffic Attribution using Multifaceted Footprinting.10.372014
Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation00.342014
Outsourcing multi-version key-value stores with verifiable data freshness70.552014
Practical comprehensive bounds on surreptitious communication over DNS120.762013
Scalable integrity monitoring in virtualized environments30.412010
Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors902.802010
Cloud security is not (just) virtualization security: a short paper743.362009
Virtualization and Hardware-Based Security140.792008
TVDc: managing security in the trusted virtual datacenter613.542008
Trustworthy and personalized computing on public kiosks405.822008
Managing the risk of covert information flows in virtual machine systems151.052007
A layered approach to simplified access control in virtualized systems221.312007
Retrofitting the IBM POWER Hypervisor to Support Mandatory Access Control50.792007
Linking remote attestation to secure tunnel endpoints573.802006
Shamon: A System for Distributed Mandatory Access Control332.372006
vTPM: virtualizing the trusted platform module23316.042006
Toward Automated Information-Flow Integrity Verification for Security-Critical Applications251.462006
Shame on trust in distributed systems60.662006
PRIMA: policy-reduced integrity measurement architecture1518.032006
Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor15312.612005
Design and implementation of a TCG-based integrity measurement architecture50435.992004
Pervasive Authentication Domains for Automatic Pervasive Device Authorization110.802004
Resolving constraint conflicts181.672004
Attestation-based policy enforcement for remote access937.552004
Analyzing integrity protection in the SELinux example policy804.622003
Authentication for Distributed Web Caches70.662002
Secure coprocessor-based intrusion detection545.122002
IPSECvalidate: A Tool to Validate IPSEC Configurations10.422001
Verteiltes Filtern mit Contags und Sicherheits-Labeln00.342001
Building the IBM 4758 Secure Coprocessor11814.802001
An Evolutionary Approach to Multilaterally Secure Services in ISDN / IN30.431998
Authentikation als Grundlage der Skalierung von Sicherheit in der Kommunikationstechnik00.341997
Ein Domain-Konzept zur systematischen und wirtschaftlichen Integration von Sicherheit in Kommunikationsnetze.10.391996