Gregor Maier's Publications

Back to my homepage.

Conferences and Workshops

  1. Gerald Friedland, Gregor Maier, Robin Sommer, and Nicholas Weaver
    Sherlock Holmes' Evil Twin: On The Impact of Global Inference for Online Privacy
    In NSPW'11: New Security Paradigms Workshop PDF
  2. Christian Kreibich, Nicholas Weaver, Gregor Maier, Boris Nechaev, Vern Paxson
    Experiences from Netalyzr with Engaging Users in End-System Measurement
    In W-MUST'11: ACM SIGCOMM Workshop on Measurements Up the STack PDF
  3. Gregor Maier, Anja Feldmann, Vern Paxson, Robin Sommer, Matthias Vallentin
    An Assessment of Overt Malicious Activity Manifest in Residential Networks
    In DIMVA'11: Proceedings of the Conference on Detection of Intrusions and Malware and Vulnerability Assessment, PDF
  4. He (Lonnie) Liu, Kirill Levchenko, Mark Felegyhazi, Christian Kreibich, Gregor Maier, Geoffrey M. Voelker, Stefan Savage
    On the Effects of Registrar-level Intervention
    In Leet'11: Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threads PDF
  5. Gregor Maier, Fabian Schneider, Anja Feldmann
    NAT Usage in Residential Broadband Networks
    In PAM '11: Proceedings of the 12th International Conference on Passive and Active Network Measurement PDF
  6. Gregor Maier, Fabian Schneider, Anja Feldmann
    A First Look at Mobile Hand-held Device Traffic
    In PAM '10: Proceedings of the 11th International Conference on Passive and Active Network Measurement, (Location: Zurich, Switzerland), Pages 161--170, Springer, April 2010. PDF
  7. Gregor Maier, Anja Feldmann, Vern Paxson, Mark Allman
    On Dominant Characteristics of Residential Broadband Internet Traffic
    In IMC '09: Proceedings of the 2009 Internet Measurement Conference, (Location: Chicago, IL), Pages 90-102, ACM Press, November 2009. PDF
  8. Anja Feldmann, Gregor Maier, Wolfgang Mühlbauer, Yevgen Rogoza
    Enabling Seamless Internet Mobility
    In Proc. of the 16th IEEE Workshopp on Local and Metropolitan Area Networks (LANMAN), (Location: Cluj-Napoca, Transylvania, Romania), IEEE, September 2008. PDF
  9. Gregor Maier, Robin Sommer, Holger Dreger, Anja Feldmann, Vern Paxson, Fabian Schneider
    Enriching Network Security Analysis with Time Travel
    In SIGCOMM '08: Proceedings of the 2008 conference on Applications, technologies, architectures, and protocols for computer communications, (Location: Seattle, WA, USA), Pages 183-194, ACM Press, August 2008. PDF
  10. Gregor Maier, Wolfgang Mühlbauer, Yevgen Rogoza, Anja Feldmann
    Enabling Seamless Internet Mobility
    In CoNEXT'07 Student Workshop: Proceedings of the 3rd International Conference on Emerging networking EXperiments and Technologies, (Location: New York, NY, USA), Pages 1-2, ACM Press, December 2007. PDF

Books

  1. Robin Sommer, Davide Balzarotti, Gregor Maier (Eds.)
    Recent Advances in Intrusion Detection (RAID)
    Springer, Lecture Notes in Computer Science, number 6961, ISBN 978-3-642-23643-3, 2011

Theses and Projects

  1. Gregor Maier
    Residential Broadband Internet Traffic: Characterization and Security Analysis
    PhD thesis Technische Universität Berlin, Berlin, Germany
    September 2010. PDF
  2. Gregor Maier
    Hardware Pattern Matching for Network Traffic Analysis in Gigabit Environments
    Diplomarbeit Technische Universität München, Munich, Germany
    May 2007. PDF
  3. Patricia Badi-Ulmer, Andreas Dollinger, Gregor Maier
    Tracking, Tracing und Parameterabfrage von hochpreisigen beweglichen Geräten und Apparaten im Krankenhaus
    Interdisziplinäres Projekt Technische Universität München, Munich, Germany
    June 2006. PDF
  4. Gregor Maier
    Design and Implementation of a BPF Filtering Engine in Firmware Firmware (VHDL)
    Systementwicklungsprojekt (Semeter software project) Technische Universität München, Munich, Germany
    December 2005.

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.