Suivre
Felix Freiling
Titre
Citée par
Citée par
Année
Toward automated dynamic malware analysis using cwsandbox
C Willems, T Holz, F Freiling
IEEE Security & Privacy 5 (2), 32-39, 2007
11152007
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm.
T Holz, M Steiner, F Dahl, EW Biersack, FC Freiling
Leet 8 (1), 1-9, 2008
6292008
Measuring and detecting fast-flux service networks.
T Holz, C Gorecki, K Rieck, FC Freiling
Ndss, 2008
5302008
The nepenthes platform: An efficient approach to collect malware
P Baecher, M Koetter, T Holz, M Dornseif, F Freiling
Recent Advances in Intrusion Detection: 9th International Symposium, RAID …, 2006
5232006
Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks
FC Freiling, T Holz, G Wicherski
Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005
4802005
Mobile-sandbox: having a deeper look into android applications
M Spreitzenbarth, F Freiling, F Echtler, T Schreck, J Hoffmann
Proceedings of the 28th annual ACM symposium on applied computing, 1808-1815, 2013
4352013
Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms
R Hund, T Holz, FC Freiling
USENIX security symposium, 383-398, 2009
3732009
Learning more about the underground economy: A case-study of keyloggers and dropzones
T Holz, M Engelberth, F Freiling
Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009
3342009
Mobile security catching up? revealing the nuts and bolts of the security of mobile devices
M Becher, FC Freiling, J Hoffmann, T Holz, S Uellenbeck, C Wolf
2011 IEEE Symposium on Security and Privacy, 96-111, 2011
3312011
A structured approach to anomaly detection for in-vehicle networks
M Müter, A Groll, FC Freiling
2010 Sixth International Conference on Information Assurance and Security, 92-98, 2010
2802010
{TRESOR} Runs Encryption Securely Outside {RAM}
T Müller, FC Freiling, A Dewald
20th USENIX Security Symposium (USENIX Security 11), 2011
2292011
Hardware-based trusted computing architectures for isolation and attestation
P Maene, J Götzfried, R De Clercq, T Müller, F Freiling, I Verbauwhede
IEEE Transactions on Computers 67 (3), 361-374, 2017
2072017
Towards intrusion detection in wireless sensor networks
K Ioannis, T Dimitriou, FC Freiling
Proc. of the 13th European Wireless Conference, 1-10, 2007
2042007
On Botnets that use DNS for Command and Control
CJ Dietrich, C Rossow, FC Freiling, H Bos, M Van Steen, N Pohlmann
2011 seventh european conference on computer network defense, 9-16, 2011
1852011
Towards intrusion detection in wireless sensor networks
I Krontiris, T Dimitriou, FC Freiling
Proceedings of the 13th European Wireless Conference, 1-4, 2007
1722007
Sancus 2.0: A low-cost security architecture for iot devices
J Noorman, JV Bulck, JT Mühlberg, F Piessens, P Maene, B Preneel, ...
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-33, 2017
1542017
Cooperative intrusion detection in wireless sensor networks
I Krontiris, Z Benenson, T Giannetsos, FC Freiling, T Dimitriou
Wireless Sensor Networks: 6th European Conference, EWSN 2009, Cork, Ireland …, 2009
1502009
A common process model for incident response and computer forensics
FC Freiling, B Schwittay
Gesellschaft für Informatik e. V., 2007
1452007
Visual analysis of malware behavior using treemaps and thread graphs
P Trinius, T Holz, J Göbel, FC Freiling
2009 6th International Workshop on Visualization for Cyber Security, 33-38, 2009
1342009
Sandnet: Network traffic analysis of malicious software
C Rossow, CJ Dietrich, H Bos, L Cavallaro, M Van Steen, FC Freiling, ...
Proceedings of the First Workshop on Building Analysis Datasets and …, 2011
1312011
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20