Follow
Seth Hall
Seth Hall
Research Engineer, International Computer Science Institute
Verified email at icir.org - Homepage
Title
Cited by
Cited by
Year
Extracting certificates from live traffic: A near real-time SSL notary service
B Amann, M Vallentin, S Hall, R Sommer
Technical Report TR-12-014, ICSI, 2012
512012
No attack necessary: The surprising dynamics of SSL trust relationships
J Amann, R Sommer, M Vallentin, S Hall
Proceedings of the 29th annual computer security applications conference …, 2013
482013
The bro network security monitor
V Paxson, R Sommer, S Hall, C Kreibich, J Barlow, G Clark, G Maier, ...
Bro. org.[Online]. Available: https://www. bro. org/.[Accessed: 10-Mar-2017], 2012
322012
Spicy: a unified deep packet inspection framework for safely dissecting all your data
R Sommer, J Amann, S Hall
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
29*2016
Revisiting SSL: A large-scale study of the internet’s most trusted protocol
B Amann, M Vallentin, S Hall, R Sommer
ICSI, Tech. Rep., 2012
292012
A lone wolf no more: Supporting network intrusion detection with real-time intelligence
J Amann, R Sommer, A Sharma, S Hall
Research in Attacks, Intrusions, and Defenses: 15th International Symposium …, 2012
262012
Count Me In: Viable Distributed Summary Statistics for Securing High-Speed Networks
J Amann, S Hall, R Sommer
14*
To Trust, or not to Trust, that is the Question: Structural Properties of X. 509 Certificates
J Amann, R Sommer, M Vallentin, S Hall
Tiny Trans. Comput. Sci. 3, 2015
2015
The structure of the anticancer compoundN-1′-ethyl-1, 8-naphthaloimide-2′-dimethyl ammonium chloride, and the structures of its PtCl42− and PtCl62− salts
GR Clark, SB Hall
Acta Crystallographica Section A 43, C55-C55, 1987
1987
The system can't perform the operation now. Try again later.
Articles 1–9