Folgen
Felix Freiling
Titel
Zitiert von
Zitiert von
Jahr
Toward automated dynamic malware analysis using cwsandbox
C Willems, T Holz, F Freiling
IEEE Security & Privacy 5 (2), 32-39, 2007
11372007
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm.
T Holz, M Steiner, F Dahl, EW Biersack, FC Freiling
Leet 8 (1), 1-9, 2008
6272008
Measuring and detecting fast-flux service networks.
T Holz, C Gorecki, K Rieck, FC Freiling
Ndss, 2008
5392008
The nepenthes platform: An efficient approach to collect malware
P Baecher, M Koetter, T Holz, M Dornseif, F Freiling
Recent Advances in Intrusion Detection: 9th International Symposium, RAID …, 2006
5312006
Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks
FC Freiling, T Holz, G Wicherski
Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005
4912005
Mobile-sandbox: having a deeper look into android applications
M Spreitzenbarth, F Freiling, F Echtler, T Schreck, J Hoffmann
Proceedings of the 28th annual ACM symposium on applied computing, 1808-1815, 2013
4512013
Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms
R Hund, T Holz, FC Freiling
USENIX security symposium, 383-398, 2009
3742009
Learning more about the underground economy: A case-study of keyloggers and dropzones
T Holz, M Engelberth, F Freiling
Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009
3432009
Mobile security catching up? revealing the nuts and bolts of the security of mobile devices
M Becher, FC Freiling, J Hoffmann, T Holz, S Uellenbeck, C Wolf
2011 IEEE Symposium on Security and Privacy, 96-111, 2011
3352011
A structured approach to anomaly detection for in-vehicle networks
M Müter, A Groll, FC Freiling
2010 Sixth International Conference on Information Assurance and Security, 92-98, 2010
2982010
{TRESOR} Runs Encryption Securely Outside {RAM}
T Müller, FC Freiling, A Dewald
20th USENIX Security Symposium (USENIX Security 11), 2011
2382011
Hardware-based trusted computing architectures for isolation and attestation
P Maene, J Götzfried, R De Clercq, T Müller, F Freiling, I Verbauwhede
IEEE Transactions on Computers 67 (3), 361-374, 2017
2272017
Towards intrusion detection in wireless sensor networks
K Ioannis, T Dimitriou, FC Freiling
Proc. of the 13th European Wireless Conference, 1-10, 2007
2082007
On botnets that use DNS for command and control
CJ Dietrich, C Rossow, FC Freiling, H Bos, M Van Steen, N Pohlmann
2011 seventh european conference on computer network defense, 9-16, 2011
1962011
Sancus 2.0: A low-cost security architecture for iot devices
J Noorman, JV Bulck, JT Mühlberg, F Piessens, P Maene, B Preneel, ...
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-33, 2017
1822017
Towards intrusion detection in wireless sensor networks
I Krontiris, T Dimitriou, FC Freiling
proceedings of the 13th European Wireless Conference, 1-4, 2007
1762007
A common process model for incident response and computer forensics
FC Freiling, B Schwittay
Gesellschaft für Informatik e. V., 2007
1532007
Cooperative intrusion detection in wireless sensor networks
I Krontiris, Z Benenson, T Giannetsos, FC Freiling, T Dimitriou
Wireless Sensor Networks: 6th European Conference, EWSN 2009, Cork, Ireland …, 2009
1502009
Visual analysis of malware behavior using treemaps and thread graphs
P Trinius, T Holz, J Göbel, FC Freiling
2009 6th International Workshop on Visualization for Cyber Security, 33-38, 2009
1422009
Sandnet: Network traffic analysis of malicious software
C Rossow, CJ Dietrich, H Bos, L Cavallaro, M Van Steen, FC Freiling, ...
Proceedings of the First Workshop on Building Analysis Datasets and …, 2011
1362011
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20