Skip to content
Licensed Unlicensed Requires Authentication Published by De Gruyter Oldenbourg March 20, 2017

Vulnerability analysis

  • Konrad Rieck

    Konrad Rieck is a Professor at Technische Universität Braunschweig, where he leads the Institute of System Security. Prior to this, he has been working at the University of Göttingen, Technische Universität Berlin and Fraunhofer Institute FIRST. He graduated in 2004 and received a Doctorate from Technische Universität Berlin in 2009. Konrad Rieck is a recipient of the CAST/GI Dissertation Award, the Google Faculty Research Award and the German Prize for IT-Security. His interests revolve around computer security and machine learning, including the detection of computer attacks, the analysis of malicious code, and the discovery of vulnerabilities.

    Technische Universität Braunschweig, Rebenring 56, 38106 Braunschweig, Germany

    EMAIL logo

About the author

Konrad Rieck

Konrad Rieck is a Professor at Technische Universität Braunschweig, where he leads the Institute of System Security. Prior to this, he has been working at the University of Göttingen, Technische Universität Berlin and Fraunhofer Institute FIRST. He graduated in 2004 and received a Doctorate from Technische Universität Berlin in 2009. Konrad Rieck is a recipient of the CAST/GI Dissertation Award, the Google Faculty Research Award and the German Prize for IT-Security. His interests revolve around computer security and machine learning, including the detection of computer attacks, the analysis of malicious code, and the discovery of vulnerabilities.

Technische Universität Braunschweig, Rebenring 56, 38106 Braunschweig, Germany

Received: 2016-12-8
Revised: 2017-1-17
Accepted: 2017-3-10
Published Online: 2017-3-20
Published in Print: 2017-4-20

©2017 Walter de Gruyter Berlin/Boston

Downloaded on 23.2.2024 from https://www.degruyter.com/document/doi/10.1515/itit-2016-0059/html
Scroll to top button