Tammo Krueger
Tammo Krueger
Verified email at - Homepage
Cited by
Cited by
Cujo: efficient detection and prevention of drive-by-download attacks
K Rieck, T Krueger, A Dewald
Proceedings of the 26th Annual Computer Security Applications Conference, 31-39, 2010
Regulation of muscle development by DPF3, a novel histone acetylation and methylation reader of the BAF chromatin remodeling complex
M Lange, B Kaynak, UB Forster, M Tönjes, JJ Fischer, C Grimm, ...
Genes & development 22 (17), 2370-2384, 2008
The cardiac transcription network modulated by Gata4, Mef2a, Nkx2. 5, Srf, histone modifications, and microRNAs
J Schlesinger, M Schueler, M Grunert, JJ Fischer, Q Zhang, T Krueger, ...
PLoS genetics 7 (2), e1001313, 2011
Identification of Y-box binding protein 1 as a core regulator of MEK/ERK pathway-dependent gene signatures in colorectal cancer cells
K Jürchott, RJ Kuban, T Krech, N Blüthgen, U Stein, W Walther, C Friese, ...
PLoS genetics 6 (12), e1001231, 2010
Learning stateful models for network honeypots
T Krueger, H Gascon, N Krämer, K Rieck
Proceedings of the 5th ACM workshop on Security and artificial intelligence …, 2012
Combinatorial effects of four histone modifications in transcription and differentiation
JJ Fischer, J Toedling, T Krueger, M Schueler, W Huber, S Sperling
Genomics 91 (1), 41-51, 2008
TokDoc: A self-healing web application firewall
T Krueger, C Gehl, K Rieck, P Laskov
Proceedings of the 2010 ACM Symposium on Applied Computing, 1846-1853, 2010
ASAP: Automatic semantics-aware analysis of network payloads
T Krueger, N Krämer, K Rieck
International Workshop on Privacy and Security Issues in Data Mining and …, 2010
Fast Cross-Validation via Sequential Testing
T Krueger, D Panknin, M Braun
Journal of Machine Learning Research 16, 1103-1155, 2015
Fast cross-validation via sequential testing.
T Krueger, D Panknin, ML Braun
Journal of Machine Learning Research 16 (1), 1103-55, 2015
Analyzing local structure in kernel-based learning: Explanation, complexity, and reliability assessment
G Montavon, M Braun, T Krueger, KR Müller
Signal Processing Magazine, IEEE 30 (4), 62-74, 2013
Approximate tree kernels
K Rieck, T Krueger, U Brefeld, KR Müller
The Journal of Machine Learning Research 11, 555-580, 2010
Autonomous learning for detection of JavaScript attacks: vision or reality?
G Schwenk, A Bikadorov, T Krueger, K Rieck
Proceedings of the 5th ACM workshop on Security and artificial intelligence …, 2012
Intelligent defense against malicious javascript code
T Krueger, K Rieck
PIK-Praxis der Informationsverarbeitung und Kommunikation 35 (1), 54-60, 2012
An architecture for inline anomaly detection
T Krueger, C Gehl, K Rieck, P Laskov
2008 European Conference on Computer Network Defense, 11-18, 2008
Approximate kernels for trees
K Rieck, T Krueger, U Brefeld
Privacy-Enhanced Fraud Detection with Bloom Filters
D Arp, E Quiring, T Krueger, S Dragiev, K Rieck
Security and Privacy in Communication Networks: 14th International …, 2018
Fast Cross-Validation via Sequential Analysis
T Krueger, D Panknin, M Braun
Fips: First intrusion prevention system
I Schuster, T Krueger, C Gehl, K Rieck, P Laskov
Technical Report 1, Fraunhofer FIRST, 2010. URL http://publica. fraunhofer …, 0
Probabilistic Methods for Network Security. From Analysis to Response
T Krueger
Universitätsbibliothek, 2013
The system can't perform the operation now. Try again later.
Articles 1–20