D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 36 Citations 9,614 122 World Ranking 7004 National Ranking 332

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • The Internet
  • Programming language

The scientist’s investigation covers issues in Computer security, Artificial intelligence, Malware, Machine learning and Static analysis. Konrad Rieck works mostly in the field of Computer security, limiting it down to concerns involving The Internet and, occasionally, Computer virus, Computer network, High availability and Host. His work in Artificial intelligence tackles topics such as Pattern recognition which are related to areas like Pairwise comparison, String and Data structure.

His study in Malware is interdisciplinary in nature, drawing from both Android and Evasion. His study looks at the intersection of Machine learning and topics like Anomaly detection with Intrusion detection system, Language model, Process and Key. His Static analysis study also includes fields such as

  • Source code which connect with Code, Representation and Data mining,
  • Software which connect with Data validation, Discriminative model and Buffer overflow.

His most cited work include:

  • DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. (1114 citations)
  • Automatic analysis of malware behavior using machine learning (503 citations)
  • Learning and Classification of Malware Behavior (458 citations)

What are the main themes of his work throughout his whole career to date?

His main research concerns Computer security, Artificial intelligence, Malware, Machine learning and Intrusion detection system. His research on Computer security also deals with topics like

  • The Internet together with Host and Computer virus,
  • Software together with Static analysis and Graph database. His Artificial intelligence research is multidisciplinary, incorporating elements of Adversary, Identification, Optimization problem and Pattern recognition.

Konrad Rieck studies Malware, focusing on Cryptovirology in particular. His Machine learning study also includes

  • Source code that intertwine with fields like Integer,
  • Exploit which intersects with area such as Computer network. Konrad Rieck has researched Intrusion detection system in several fields, including Anomaly detection, Distributed computing and Taxonomy.

He most often published in these fields:

  • Computer security (42.86%)
  • Artificial intelligence (30.16%)
  • Malware (26.98%)

What were the highlights of his more recent work (between 2019-2021)?

  • Computer security (42.86%)
  • Artificial neural network (6.35%)
  • Artificial intelligence (30.16%)

In recent papers he was focusing on the following fields of study:

Konrad Rieck spends much of his time researching Computer security, Artificial neural network, Artificial intelligence, Malware and Image scaling. His research is interdisciplinary, bridging the disciplines of Variety and Computer security. Konrad Rieck frequently studies issues relating to Behavioral pattern and Artificial neural network.

His Artificial intelligence research is multidisciplinary, incorporating perspectives in Machine learning and Vulnerability discovery. Many of his research projects under Machine learning are closely connected to Work and TRACE with Work and TRACE, tying the diverse disciplines of science together. The Vulnerability discovery study combines topics in areas such as Deep learning and Robustness.

Between 2019 and 2021, his most popular works were:

  • Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning. (9 citations)
  • Evaluating Explanation Methods for Deep Learning in Security (6 citations)
  • Backdooring and Poisoning Neural Networks with Image-Scaling Attacks (6 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Programming language
  • The Internet

Konrad Rieck focuses on Image scaling, Artificial neural network, Artificial intelligence, Backdoor and Computer security. His study of Image scaling brings together topics like Preprocessor, Machine learning and Adversarial system. Konrad Rieck combines subjects such as Vulnerability discovery, Deep learning, Malware, Robustness and Data science with his study of Artificial neural network.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket.

Daniel Arp;Michael Spreitzenbarth;Malte Hubner;Hugo Gascon.
network and distributed system security symposium (2014)

1947 Citations

Support Vector Machines

Konrad Rieck;Sören Sonnenburg;Sebastian Mika;Christin Schäfer.
(2012)

1715 Citations

Automatic analysis of malware behavior using machine learning

Konrad Rieck;Philipp Trinius;Carsten Willems;Thorsten Holz_aff n.
Journal of Computer Security (2011)

825 Citations

Learning and Classification of Malware Behavior

Konrad Rieck;Thorsten Holz;Carsten Willems;Patrick Düssel.
international conference on detection of intrusions and malware and vulnerability assessment (2008)

773 Citations

Measuring and Detecting Fast-Flux Service Networks

Thorsten Holz;Christian Gorecki;Konrad Rieck;Felix C. Freiling.
network and distributed system security symposium (2008)

549 Citations

Modeling and Discovering Vulnerabilities with Code Property Graphs

Fabian Yamaguchi;Nico Golde;Daniel Arp;Konrad Rieck.
ieee symposium on security and privacy (2014)

380 Citations

Structural detection of android malware using embedded call graphs

Hugo Gascon;Fabian Yamaguchi;Daniel Arp;Konrad Rieck.
Proceedings of the 2013 ACM workshop on Artificial intelligence and security (2013)

348 Citations

Learning intrusion detection: supervised or unsupervised?

Pavel Laskov;Patrick Düssel;Christin Schäfer;Konrad Rieck.
international conference on image analysis and processing (2005)

321 Citations

Toward supervised anomaly detection

Nico Görnitz;Marius Kloft;Konrad Rieck;Ulf Brefeld.
Journal of Artificial Intelligence Research (2013)

316 Citations

Cujo: efficient detection and prevention of drive-by-download attacks

Konrad Rieck;Tammo Krueger;Andreas Dewald.
annual computer security applications conference (2010)

257 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Konrad Rieck

Yang Liu

Yang Liu

Nanyang Technological University

Publications: 43

Giorgio Giacinto

Giorgio Giacinto

University of Cagliari

Publications: 32

Mourad Debbabi

Mourad Debbabi

Concordia University

Publications: 27

Klaus-Robert Müller

Klaus-Robert Müller

Technical University of Berlin

Publications: 26

Christopher Kruegel

Christopher Kruegel

University of California, Santa Barbara

Publications: 26

Thorsten Holz

Thorsten Holz

Ruhr University Bochum

Publications: 20

Battista Biggio

Battista Biggio

University of Cagliari

Publications: 20

Mauro Conti

Mauro Conti

University of Padua

Publications: 20

Yang Xiang

Yang Xiang

Swinburne University of Technology

Publications: 20

Giovanni Vigna

Giovanni Vigna

University of California, Santa Barbara

Publications: 19

Yuval Elovici

Yuval Elovici

Ben-Gurion University of the Negev

Publications: 18

Jun Zhang

Jun Zhang

Swinburne University of Technology

Publications: 18

Jacques Klein

Jacques Klein

University of Luxembourg

Publications: 17

Tegawendé F. Bissyandé

Tegawendé F. Bissyandé

University of Luxembourg

Publications: 17

Shouhuai Xu

Shouhuai Xu

University of Colorado Colorado Springs

Publications: 17

Gianluca Stringhini

Gianluca Stringhini

Boston University

Publications: 16

Trending Scientists

Yuval Elovici

Yuval Elovici

Ben-Gurion University of the Negev

Sebastian Scherer

Sebastian Scherer

Carnegie Mellon University

Gérard Meunier

Gérard Meunier

Grenoble Alpes University

Valentine G. Nenajdenko

Valentine G. Nenajdenko

Lomonosov Moscow State University

Mohammad Haghighi

Mohammad Haghighi

Sahand University of Technology

Frank Hollmann

Frank Hollmann

Delft University of Technology

Ralf Riedel

Ralf Riedel

Technical University of Darmstadt

Nini Pryds

Nini Pryds

Technical University of Denmark

Ko Noguchi

Ko Noguchi

Tokyo University of Pharmacy and Life Sciences

Tetsuya Nosaka

Tetsuya Nosaka

Mie University

Claudine Manach

Claudine Manach

University of Clermont Auvergne

Geert-Jan van Gemert

Geert-Jan van Gemert

Radboud University Nijmegen

Mathias Herrmann

Mathias Herrmann

Saarland University

Oscar Marín

Oscar Marín

King's College London

Lars P. Ryder

Lars P. Ryder

University of Copenhagen

Howard M. Grey

Howard M. Grey

La Jolla Institute For Allergy & Immunology

Something went wrong. Please try again later.