Folgen
Felix Freiling
Titel
Zitiert von
Zitiert von
Jahr
Toward automated dynamic malware analysis using cwsandbox
C Willems, T Holz, F Freiling
IEEE Security & Privacy 5 (2), 32-39, 2007
11102007
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm.
T Holz, M Steiner, F Dahl, EW Biersack, FC Freiling
Leet 8 (1), 1-9, 2008
6252008
Measuring and detecting fast-flux service networks.
T Holz, C Gorecki, K Rieck, FC Freiling
Ndss, 2008
5292008
The nepenthes platform: An efficient approach to collect malware
P Baecher, M Koetter, T Holz, M Dornseif, F Freiling
Recent Advances in Intrusion Detection: 9th International Symposium, RAID …, 2006
5212006
Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks
FC Freiling, T Holz, G Wicherski
Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005
4802005
Mobile-sandbox: having a deeper look into android applications
M Spreitzenbarth, F Freiling, F Echtler, T Schreck, J Hoffmann
Proceedings of the 28th annual ACM symposium on applied computing, 1808-1815, 2013
4342013
Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms
R Hund, T Holz, FC Freiling
USENIX security symposium, 383-398, 2009
3732009
Learning more about the underground economy: A case-study of keyloggers and dropzones
T Holz, M Engelberth, F Freiling
Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009
3322009
Mobile security catching up? revealing the nuts and bolts of the security of mobile devices
M Becher, FC Freiling, J Hoffmann, T Holz, S Uellenbeck, C Wolf
2011 IEEE Symposium on Security and Privacy, 96-111, 2011
3292011
A structured approach to anomaly detection for in-vehicle networks
M Müter, A Groll, FC Freiling
2010 Sixth International Conference on Information Assurance and Security, 92-98, 2010
2772010
{TRESOR} Runs Encryption Securely Outside {RAM}
T Müller, FC Freiling, A Dewald
20th USENIX Security Symposium (USENIX Security 11), 2011
2282011
Hardware-based trusted computing architectures for isolation and attestation
P Maene, J Götzfried, R De Clercq, T Müller, F Freiling, I Verbauwhede
IEEE Transactions on Computers 67 (3), 361-374, 2017
2052017
Towards intrusion detection in wireless sensor networks
K Ioannis, T Dimitriou, FC Freiling
Proc. of the 13th European Wireless Conference, 1-10, 2007
2032007
On Botnets that use DNS for Command and Control
CJ Dietrich, C Rossow, FC Freiling, H Bos, M Van Steen, N Pohlmann
2011 seventh european conference on computer network defense, 9-16, 2011
1832011
Towards intrusion detection in wireless sensor networks
I Krontiris, T Dimitriou, FC Freiling
Proceedings of the 13th European Wireless Conference, 1-4, 2007
1702007
Sancus 2.0: A low-cost security architecture for iot devices
J Noorman, JV Bulck, JT Mühlberg, F Piessens, P Maene, B Preneel, ...
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-33, 2017
1512017
Cooperative intrusion detection in wireless sensor networks
I Krontiris, Z Benenson, T Giannetsos, FC Freiling, T Dimitriou
Wireless Sensor Networks: 6th European Conference, EWSN 2009, Cork, Ireland …, 2009
1492009
A common process model for incident response and computer forensics
FC Freiling, B Schwittay
Gesellschaft für Informatik e. V., 2007
1432007
Visual analysis of malware behavior using treemaps and thread graphs
P Trinius, T Holz, J Göbel, FC Freiling
2009 6th International Workshop on Visualization for Cyber Security, 33-38, 2009
1342009
Sandnet: Network traffic analysis of malicious software
C Rossow, CJ Dietrich, H Bos, L Cavallaro, M Van Steen, FC Freiling, ...
Proceedings of the First Workshop on Building Analysis Datasets and …, 2011
1302011
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20