Bonnmotion: a mobility scenario generation and analysis tool N Aschenbruck, R Ernst, E Gerhards-Padilla, M Schwamborn 3rd International ICST Conference on Simulation Tools and Techniques, 2010 | 576 | 2010 |
Discovre: Efficient cross-architecture identification of bugs in binary code. S Eschweiler, K Yakdan, E Gerhards-Padilla Ndss 52, 58-79, 2016 | 379 | 2016 |
A comprehensive measurement study of domain generating malware D Plohmann, K Yakdan, M Klatt, J Bader, E Gerhards-Padilla 25th USENIX Security Symposium (USENIX Security 16), 263-278, 2016 | 346 | 2016 |
Modelling mobility in disaster area scenarios N Aschenbruck, E Gerhards-Padilla, M Gerharz, M Frank, P Martini Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation …, 2007 | 303 | 2007 |
A survey on mobility models for performance analysis in tactical mobile networks N Aschenbruck, E Gerhards-Padilla, P Martini Journal of Telecommunications and Information Technology, 54-61, 2008 | 203 | 2008 |
Helping johnny to analyze malware: A usability-optimized decompiler and malware analysis user study K Yakdan, S Dechand, E Gerhards-Padilla, M Smith 2016 IEEE Symposium on Security and Privacy (SP), 158-177, 2016 | 153 | 2016 |
No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantic-Preserving Transformations. K Yakdan, S Eschweiler, E Gerhards-Padilla, M Smith NDSS, 2015 | 125 | 2015 |
Detecting black hole attacks in tactical MANETs using topology graphs E Gerhards-Padilla, N Aschenbruck, P Martini, M Jahnke, J Tolle 32nd IEEE Conference on Local Computer Networks (LCN 2007), 1043-1052, 2007 | 114 | 2007 |
Case study of the miner botnet D Plohmann, E Gerhards-Padilla 2012 4th International Conference on Cyber Conflict (CYCON 2012), 1-16, 2012 | 108 | 2012 |
PDF Scrutinizer: Detecting JavaScript-based attacks in PDF documents F Schmitt, J Gassen, E Gerhards-Padilla 2012 tenth annual international conference on privacy, security and trust …, 2012 | 63 | 2012 |
Malpedia: a collaborative effort to inventorize the malware landscape D Plohmann, M Clauss, S Enders, E Padilla The Journal on Cybercrime and Digital Investigations 3 (1), 1-19, 2017 | 62 | 2017 |
Botnets: Detection, measurement, disinfection & defence D Plohmann, E Gerhards-Padilla, F Leder European Network and Information Security Agency (ENISA) 1 (1), 1-153, 2011 | 62 | 2011 |
Automatic extraction of domain name generation algorithms from current malware T Barabosch, A Wichmann, F Leder, E Gerhards-Padilla Proc. NATO Symposium IST-111 on Information Assurance and Cyber Defense …, 2012 | 42 | 2012 |
BRAT: A BRidge Attack Tool for cyber security assessments of maritime systems C Hemminghaus, J Bauer, E Padilla TransNav: International Journal on Marine Navigation and Safety of Sea …, 2021 | 34 | 2021 |
Botnets: Detection, measurement, disinfection and defence G Hogben, D Plohmann, E Gerhards-Padilla, F Leder European Network and Information Security Agency, 2011 | 34 | 2011 |
Quincy: Detecting host-based code injection attacks in memory dumps T Barabosch, N Bergmann, A Dombeck, E Padilla Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017 | 30 | 2017 |
Bee master: Detecting host-based code injection attacks T Barabosch, S Eschweiler, E Gerhards-Padilla Detection of Intrusions and Malware, and Vulnerability Assessment: 11th …, 2014 | 29 | 2014 |
Detecting black hole attack in tactical MANETs using topology graph E Padilla, N Aschenbruck, P Martini, M Jahnke, J Tolle Proc. IEEE Conference on Local Computer Networks, 2007 | 29 | 2007 |
Host-based code injection attacks: A popular technique used by malware T Barabosch, E Gerhards-Padilla 2014 9th International Conference on Malicious and Unwanted Software: The …, 2014 | 28 | 2014 |
Nebula-generating syntactical network intrusion signatures T Werner, C Fuchs, E Gerhards-Padilla, P Martini 2009 4th International Conference on Malicious and Unwanted Software …, 2009 | 28 | 2009 |