H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 35 Citations 9,251 98 World Ranking 5980 National Ranking 290

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • The Internet
  • Programming language

The scientist’s investigation covers issues in Computer security, Artificial intelligence, Malware, Machine learning and Static analysis. Konrad Rieck works mostly in the field of Computer security, limiting it down to concerns involving The Internet and, occasionally, Computer virus, Computer network, High availability and Host. His work in Artificial intelligence tackles topics such as Pattern recognition which are related to areas like Pairwise comparison, String and Data structure.

His study in Malware is interdisciplinary in nature, drawing from both Android and Evasion. His study looks at the intersection of Machine learning and topics like Anomaly detection with Intrusion detection system, Language model, Process and Key. His Static analysis study also includes fields such as

  • Source code which connect with Code, Representation and Data mining,
  • Software which connect with Data validation, Discriminative model and Buffer overflow.

His most cited work include:

  • DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. (1114 citations)
  • Automatic analysis of malware behavior using machine learning (503 citations)
  • Learning and Classification of Malware Behavior (458 citations)

What are the main themes of his work throughout his whole career to date?

His main research concerns Computer security, Artificial intelligence, Malware, Machine learning and Intrusion detection system. His research on Computer security also deals with topics like

  • The Internet together with Host and Computer virus,
  • Software together with Static analysis and Graph database. His Artificial intelligence research is multidisciplinary, incorporating elements of Adversary, Identification, Optimization problem and Pattern recognition.

Konrad Rieck studies Malware, focusing on Cryptovirology in particular. His Machine learning study also includes

  • Source code that intertwine with fields like Integer,
  • Exploit which intersects with area such as Computer network. Konrad Rieck has researched Intrusion detection system in several fields, including Anomaly detection, Distributed computing and Taxonomy.

He most often published in these fields:

  • Computer security (42.86%)
  • Artificial intelligence (30.16%)
  • Malware (26.98%)

What were the highlights of his more recent work (between 2019-2021)?

  • Computer security (42.86%)
  • Artificial neural network (6.35%)
  • Artificial intelligence (30.16%)

In recent papers he was focusing on the following fields of study:

Konrad Rieck spends much of his time researching Computer security, Artificial neural network, Artificial intelligence, Malware and Image scaling. His research is interdisciplinary, bridging the disciplines of Variety and Computer security. Konrad Rieck frequently studies issues relating to Behavioral pattern and Artificial neural network.

His Artificial intelligence research is multidisciplinary, incorporating perspectives in Machine learning and Vulnerability discovery. Many of his research projects under Machine learning are closely connected to Work and TRACE with Work and TRACE, tying the diverse disciplines of science together. The Vulnerability discovery study combines topics in areas such as Deep learning and Robustness.

Between 2019 and 2021, his most popular works were:

  • Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning. (9 citations)
  • Evaluating Explanation Methods for Deep Learning in Security (6 citations)
  • Backdooring and Poisoning Neural Networks with Image-Scaling Attacks (6 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Programming language
  • The Internet

Konrad Rieck focuses on Image scaling, Artificial neural network, Artificial intelligence, Backdoor and Computer security. His study of Image scaling brings together topics like Preprocessor, Machine learning and Adversarial system. Konrad Rieck combines subjects such as Vulnerability discovery, Deep learning, Malware, Robustness and Data science with his study of Artificial neural network.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Support Vector Machines

Konrad Rieck;Sören Sonnenburg;Sebastian Mika;Christin Schäfer.
(2012)

1715 Citations

DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket.

Daniel Arp;Michael Spreitzenbarth;Malte Hubner;Hugo Gascon.
network and distributed system security symposium (2014)

1668 Citations

Automatic analysis of malware behavior using machine learning

Konrad Rieck;Philipp Trinius;Carsten Willems;Thorsten Holz_aff n.
Journal of Computer Security (2011)

753 Citations

Learning and Classification of Malware Behavior

Konrad Rieck;Thorsten Holz;Carsten Willems;Patrick Düssel.
international conference on detection of intrusions and malware and vulnerability assessment (2008)

729 Citations

Measuring and Detecting Fast-Flux Service Networks

Thorsten Holz;Christian Gorecki;Konrad Rieck;Felix C. Freiling.
network and distributed system security symposium (2008)

489 Citations

Structural detection of android malware using embedded call graphs

Hugo Gascon;Fabian Yamaguchi;Daniel Arp;Konrad Rieck.
Proceedings of the 2013 ACM workshop on Artificial intelligence and security (2013)

315 Citations

Modeling and Discovering Vulnerabilities with Code Property Graphs

Fabian Yamaguchi;Nico Golde;Daniel Arp;Konrad Rieck.
ieee symposium on security and privacy (2014)

301 Citations

Learning intrusion detection: supervised or unsupervised?

Pavel Laskov;Patrick Düssel;Christin Schäfer;Konrad Rieck.
international conference on image analysis and processing (2005)

293 Citations

Toward supervised anomaly detection

Nico Görnitz;Marius Kloft;Konrad Rieck;Ulf Brefeld.
Journal of Artificial Intelligence Research (2013)

252 Citations

Cujo: efficient detection and prevention of drive-by-download attacks

Konrad Rieck;Tammo Krueger;Andreas Dewald.
annual computer security applications conference (2010)

241 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Konrad Rieck

Yang Liu

Yang Liu

Nanyang Technological University

Publications: 43

Giorgio Giacinto

Giorgio Giacinto

University of Cagliari

Publications: 32

Mourad Debbabi

Mourad Debbabi

Concordia University

Publications: 27

Klaus-Robert Müller

Klaus-Robert Müller

Technical University of Berlin

Publications: 26

Christopher Kruegel

Christopher Kruegel

University of California, Santa Barbara

Publications: 26

Mauro Conti

Mauro Conti

University of Padua

Publications: 20

Thorsten Holz

Thorsten Holz

Ruhr University Bochum

Publications: 20

Yang Xiang

Yang Xiang

Swinburne University of Technology

Publications: 20

Battista Biggio

Battista Biggio

University of Cagliari

Publications: 20

Giovanni Vigna

Giovanni Vigna

University of California, Santa Barbara

Publications: 19

Yuval Elovici

Yuval Elovici

Ben-Gurion University of the Negev

Publications: 18

Jacques Klein

Jacques Klein

University of Luxembourg

Publications: 17

Tegawendé F. Bissyandé

Tegawendé F. Bissyandé

University of Luxembourg

Publications: 17

Shouhuai Xu

Shouhuai Xu

University of Colorado Colorado Springs

Publications: 17

Gianluca Stringhini

Gianluca Stringhini

Boston University

Publications: 16

Something went wrong. Please try again later.