Zurück zur Übersicht
Exportieren als [feed] RSS 1.0 [feed] RSS 2.0

Zitation

Gruppieren nach: Erscheinungsjahr | Autoren | Dokumenttyp | Keine Sortierung

Zeitschriftenartikel

Benenson, Zinaida ; Blaß, Erik-Oliver ; Freiling, Felix (2010) Attacker models for wireless sensor networks. Information Technology : IT Berlin 52 6 320-324 [Zeitschriftenartikel]

Bäcker, Matthias ; Freiling, Felix ; Schmitt, Sven (2010) Selektion vor der Sicherung : Methoden zur effizienten forensischen Sicherung von digitalen Speichermedien. Datenschutz und Datensicherheit : DuD Wiesbaden 34 2 80-85 [Zeitschriftenartikel]

Benenson, Zinaida ; Freiling, Felix ; Bestehorn, Markus ; Böhm, Klemens ; Buchmann, Erik ; Jawurek, Marek (2009) Query dissemination in sensor networks - predicting reachability and energy consumption. Ad Hoc & Sensor Wireless Networks Philadelphia, PA 9 1/2 85-107 [Zeitschriftenartikel]

Freiling, Felix ; Heinson, Dennis (2009) Probleme des Verkehrsdatenbegriffs im Rahmen der Vorratsdatenspeicherung. Datenschutz und Datensicherheit : DuD Wiesbaden 33 9 547-552 [Zeitschriftenartikel]

Freiling, Felix (2009) Ein Blick auf IT-Sicherheit aus Angreiferperspektive: Vom Wert offensiver Methoden. Datenschutz und Datensicherheit : DuD Wiesbaden 33 1 1-4 [Zeitschriftenartikel]

Mink, Martin ; Freiling, Felix ; Liegl, Marion (2009) Datenschutz in digital-forensischen Lehrveranstaltungen. Datenschutz und Datensicherheit : DuD Wiesbaden 33 4 222-227 [Zeitschriftenartikel]

Mittal, Neeraj ; Phaneesh, Kuppahalli L. ; Freiling, Felix (2009) Safe termination detection in an asynchronous distributed system when processes may crash and recover. Theoretical Computer Science Amsterdam [u.a.] 410 6/7 614-628 [Zeitschriftenartikel]

Wilke, Joachim ; Blaß, Erik-Oliver ; Freiling, Felix ; Zitterbart, Martina (2009) A framework for probabilistic, authentic aggregation in wireless sensor networks. Praxis der Informationsverarbeitung und Kommunikation : PIK München 32 2 116-126 [Zeitschriftenartikel]

Mink, Martin (2008) Über den Nutzen offensiver Lehre. Digma Zürich 8 3 130-133 [Zeitschriftenartikel]

Mittal, Neeraj ; Freiling, Felix ; Venkatesan, Subbarayan ; Draque Penso, Lucia (2008) On termination detection in crash-prone distributed systems with failure detectors. Journal of Parallel and Distributed Computing Orlando, FL ; Amsterdam 68 6 855-875 [Zeitschriftenartikel]

Holz, Thorsten (2007) Toward Automated Dynamic Malware Analysis Using CWSandbox. IEEE Security & Privacy : Building Confidence in a Networked World / IEEE Computer Society, Institute of Electrical and Electronics Engineers New York, NY [u.a.] 5 2 32-39 [Zeitschriftenartikel]

Freiling, Felix ; Jhumka, Arshad ; Fetzer, Christof ; Suri, Neeraj (2006) An approach to synthesize safe systems. International Journal of Security and Networks : IJSN Genève 62-74 [Zeitschriftenartikel]

Freiling, Felix ; Völzer, Hagen (2006) Illustrating the impossibility of crash-tolerant consensus in asynchronous systems. Operating Systems Review / ACM SIGOPS New York, NY 40 2 105-109 [Zeitschriftenartikel]

Holz, Thorsten (2005) A Short Visit to the Bot Zoo. IEEE Security & Privacy : Building Confidence in a Networked World / IEEE Computer Society, Institute of Electrical and Electronics Engineers New York, NY 3 3 76-79 [Zeitschriftenartikel]

Holz, Thorsten (2005) Spying With the Help of Bots. Login : The USENIX Association Newsletter Berkeley, Calif. 30 6 18-23 [Zeitschriftenartikel]

Holz, Thorsten ; Freiling, Felix ; Dornseif, Maximillian (2005) Vulnerability Assessment using Honepots. Praxis der Informationsverarbeitung und Kommunikation : PIK München 4 27 195-201 [Zeitschriftenartikel]

Holz, Thorsten (2005) A Short Visit to the Bot Zoo. IEEE Security & Privacy : Building Confidence in a Networked World / IEEE Computer Society, Institute of Electrical and Electronics Engineers New York, NY 3 3 76-79 [Zeitschriftenartikel]

Fiege, Ludger ; Mühl, Gero ; Freiling, Felix (2003) Modular event-based systems. Knowledge Engineering Review Cambridge 17 4 55-85 [Zeitschriftenartikel]

Vogt, Holger ; Pagnia, Henning ; Freiling, Felix (2003) Supporting Fair Exchange in Mobile Environments. Mobile Networks and Applications : MONET Dordrecht 8 2 127-136 [Zeitschriftenartikel]

Freiling, Felix (2000) Mathematische Spielereien um Fehler und Fehlertoleranzen. Thema Forschung : das Wissenschaftsmagazin der Technischen Universität Darmstadt Monsheim 1 84-88 [Zeitschriftenartikel]

Mantel, Heiko ; Freiling, Felix (2000) A case study in the mechanical verification of fault tolerance. Journal of Experimental & Theoretical Artificial Intelligence : JETAI London [u.a.] 12 4 473-488 [Zeitschriftenartikel]

Freiling, Felix (1999) A survey of transformational approaches to the specification and verification of fault-tolerant systems. Journal of Universal Computer Science : J.UCS Graz 5 10 668-692 [Zeitschriftenartikel]

Freiling, Felix (1999) Fundamentals of fault-tolerant distributed computing in asynchronous environments. ACM Computing Surveys : CSUR New York, NY 31 1 1-26 [Zeitschriftenartikel]

Freiling, Felix (1998) Alle Jahre wieder ...: Eine fiktive Leidensgeschichte. Informatik-Spektrum Berlin [u.a.] 21 3 161 [Zeitschriftenartikel]

Freiling, Felix (1998) Towards 100 Percent Correct Software. FIfF-Kommunikation Bremen 15 3 64 [Zeitschriftenartikel]

Buch

Göbel, Jan Gerrit ; Dewald, Andreas (2011) Client-Honeypots : Exploring Malicious Websites. München [Buch]

Dewald, Andreas ; Freiling, Felix (2011) Forensische Informatik. Norderstedt [Buch]

Eusgeld, Irene ; Freiling, Felix ; Reussner, Ralf (2008) Dependability Metrics. Lecture Notes in Computer Science Berlin [u.a.] 4909 [Buch]

Becher, Michael (2007) Web Application Firewalls : Applied Web application security. Saarbrücken [Buch]

Geldenhuys, Aletta E. ; Rooyen, Hendrik O. van ; Stetter, Franz (1999) Knowledge representation and relation nets. Boston [Buch]

Buchkapitel

Freiling, Felix ; Giannetsos, Thanassis ; Krontiris, Ioannis ; Dimitriou, Tassos (2009) Intrusion Detection in Wireless Sensor Networks. Zhang, Yan Security in RFID and Sensor Networks Boca Raton [u.a.] 263-278 [Buchkapitel]

Benenson, Zinaida ; Cholewinski, Peter M. ; Freiling, Felix (2008) Vulnerabilities and Attacks in Wireless Sensor Networks. Lopez, Javier Wireless Sensor Network Security Cryptology and information security series Amsterdam [u.a.] 1 22-43 [Buchkapitel]

Benenson, Zinaida (2007) Lower Bounds. Wagner, Dorothea Algorithms for Sensor and Ad Hoc Networks Lecture Notes in Computer Science Berlin [u.a.] 4621 117-130 [Buchkapitel]

Bornhövd, Christof ; Buchmann, Alejandro ; Cilia, Mariano ; Fiege, Ludger ; Freiling, Felix ; Liebig, Christoph ; Meixner, Matthias ; Mühl, Gero (2004) DREAM : Distributed Reliable Event-Based Application Management. Levene, Mark Web Dynamics : Adapting to Change in Content, Size, Topology and Use Berlin [u.a.] 319-349 [Buchkapitel]

Pagnia, Henning ; Vogt, Holger ; Freiling, Felix (2002) Fairer Austausch im Mobile Business. Reichwald, Ralf Mobile Kommunikation : Wertschöpfung, Technologien, neue Dienste Wiesbaden 157-170 [Buchkapitel]

Freiling, Felix (2002) Formale Grundlagen der Fehlertoleranz in verteilten Systemen. Beilner, Heinz Ausgezeichnete Informatikdissertationen 2001 GI-Edition : Lecture Notes in Informatics. Dissertation Bonn 2 39-50 [Buchkapitel]

Freiling, Felix (1999) Fehlertolerante Informationsverarbeitung. Spitzenforschung in Hessen 74-75 [Buchkapitel]

Dissertation

Gorecki, Christian (2013) Dilution: A Novel Approach In Preserving Privacy. Open Access Mannheim [Dissertation]
[img]
Vorschau

Engelberth, Markus (2013) Social Malcode : Benutzerabhängige Schadprogramme. Open Access Mannheim [Dissertation]
[img]
Vorschau

Dietrich, Christian (2012) Identification and Recognition of Remote-Controlled Malware. Open Access Mannheim [Dissertation]
[img]
Vorschau

Göbel, Jan Gerrit (2011) Large-Scale Detection and Measurement of Malicious Content. Open Access None [Dissertation]
[img]
Vorschau

Trinius, Philipp (2011) Musterbasiertes Filtern von Schadprogrammen und Spam. Open Access Mannheim [Dissertation]
[img]
Vorschau

Abkai, Ciamak (2010) PhysioSim – A Full Hard- And Software Physiological Simulation Environment Applying A Hybrid Approach Based On Hierarchical Modeling Using Algebraic And Differential Systems and Dynamic Bayesian Networks. Open Access None Mannheim [Dissertation]
[img]
Vorschau

Holz, Thorsten (2009) Tracking and Mitigation of Malicious Remote Control Networks. Open Access None [Dissertation]
[img]
Vorschau

Benenson, Zinaida (2009) Access Control in Wireless Sensor Networks. Open Access None [Dissertation]
[img]
Vorschau

Mink, Martin (2009) Vergleich von Lehransätzen für die Ausbildung in IT-Sicherheit. Open Access None [Dissertation]
[img]
Vorschau

Becher, Michael (2009) Security of Smartphones at the Dawn of their Ubiquitousness. Open Access None [Dissertation]
[img]
Vorschau

Schlosser, Gregor (2009) Fast Visualization by Shear-Warp using Spline Models for Data Reconstruction. Open Access None Mannheim [Dissertation]
[img]
Vorschau

Krontiris, Ioannis (2008) Intrusion Prevention and Detection in Wireless Sensor Networks. Open Access None [Dissertation]
[img]
Vorschau

Blecher, Wolf Daniel (2008) The Hilbert-Moore sequence Acoustic Noise optimized MR Imaging. Open Access None Mannheim [Dissertation]
[img]
Vorschau

Freiling, Felix (2001) Formale Grundlagen der Fehlertoleranz in verteilten Systemen. Darmstadt [Dissertation]

Konferenzveröffentlichung

Dewald, Andreas ; Freiling, Felix ; Weber, Tim Design and Implementation of a Documentation Tool for interactive Commandline Sessions. Morgenstern, Holger 62-80 In: 2011 Sixth International Conference on IT Security Incident Management and IT Forensics (IMF 2011) : Stuttgart, Germany, 10 - 12 May 2011 (2011) Washington, DC IMF 2011 (Stuttgart, Germany) [Konferenzveröffentlichung]

Benenson, Zinaida ; Dewald, Andreas ; Eßer, Hans-Georg ; Freiling, Felix ; Müller, Thilo ; Moch, Christian ; Vömel, Stefan ; Schinzel, Sebastian ; Spreitzenbarth, Michael ; Stock, Ben ; Stüttgen, Johannes Exploring the Landscape of Cybercrime. 69-72 In: 2011 First SysSec Workshop (SysSec 2011) : Amsterdam, Netherlands, 6 July 2011 ; [proceedings] (2011) Washington, DC SysSec 2011 (Amsterdam, Netherlands) [Konferenzveröffentlichung]

Müller, Thilo ; Freiling, Felix ; Dewald, Andreas TRESOR Runs Encryption Securely Outside RAM. 17-32 In: Proceedings of the 20th USENIX conference on Security (SEC '11) (2011) Berkeley, Calif. SEC'11 (San Francisco, Calif.) [Konferenzveröffentlichung]

Müller, Tilo ; Dewald, Andreas ; Freiling, Felix AESSE: A cold-boot resistant implementation of AES. 42-47 In: Proceedings of the Third European Workshop on System Security, EUROSEC '10 (2010) New York, NY [u.a.] EUROSEC '10 (Paris, France) [Konferenzveröffentlichung]

Dewald, Andreas ; Holz, Thorsten ; Freiling, Felix ADSandbox: Sandboxing JavaScript to fight malicious websites. 1859-1864 In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC '10) (2010) New York, NY SAC '10 (Sierre, Schweiz) [Konferenzveröffentlichung]

Rieck, Konrad ; Krüger, Tammo ; Dewald, Andreas Cujo: Efficient detection and prevention of drive-by-download attacks. Gates, Carrie 31-39 In: ACSAC '10 : Proceedings 26th Annual Computer Security Applications Conference, Austin,Texas,USA, 6-10 December 2010 (2010) New York, NY [u.a.] ACSAC '10 (Austin, TX) [Konferenzveröffentlichung]

Göbel, Jan Gerrit Amun: automatic capturing of malicious software. Freiling, Felix GI-Edition : Lecture Notes in Informatics. Proceedings 170 177-190 In: Sicherheit 2010 : Sicherheit, Schutz und Zuverlässigkeit ; Konferenzband der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5. - 7. Oktober 2010 in Berlin (2010) Bonn Sicherheit 2010 (Berlin, Germany) [Konferenzveröffentlichung]

Holz, Thorsten ; Spreitzenbarth, Michael Towards secure deletion on smartphones. Freiling, Felix GI-Edition : Lecture Notes in Informatics. Proceedings 170 165-176 In: Sicherheit 2010 : Sicherheit, Schutz und Zuverlässigkeit ; Konferenzband der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5. - 7. Oktober 2010 in Berlin (2010) Bonn Sicherheit 2010 (Berlin, Germany) [Konferenzveröffentlichung]

Göbel, Jan Gerrit ; Trinius, Philipp Towards optimal sensor placement strategies for early warning systems. Freiling, Felix GI-Edition : Lecture Notes in Informatics. Proceedings 170 191-204 In: Sicherheit 2010 : Sicherheit, Schutz und Zuverlässigkeit ; Konferenzband der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5. - 7. Oktober 2010 in Berlin (2010) Bonn Sicherheit 2010 (Berlin, Germany) [Konferenzveröffentlichung]

Trinius, Philipp ; Willems, Carsten ; Holz, Thorsten ; Rieck, Konrad A malware instruction set for behavior-based analysis. Freiling, Felix GI-Edition : Lecture Notes in Informatics. Proceedings 170 205-216 In: Sicherheit 2010 : Sicherheit - Schutz und Zuverlässigkeit ; Konferenzband der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Berlin (2010) Bonn Sicherheit 2010 (Berlin, Germany) [Konferenzveröffentlichung]

Catrina, Octavian ; Hoogh, Sebastiaan de Secure multiparty linear programming using fixed-point arithmetic. Gritzalis, Dimitris Lecture Notes in Computer Science 6345 134-150 In: Computer Security - ESORICS 2010 : 15th European Symposium on Research in Computer Security, Athens, Greece, September 20 - 22, 2010; proceedings (2010) Berlin [u.a.] ESORICS 2010 (Athens, Greece) [Konferenzveröffentlichung]

Catrina, Octavian ; Hoogh, Sebastiaan de Improved primitives for secure multiparty integer computation. Garay, Juan A. Lecture Notes in Computer Science 6280 182-199 In: Security and cryptography for networks : 7th international conference, SCN 2010, Amalfi, Italy, September 13 - 15, 2010; proceedings (2010) Berlin [u.a.] SCN 2010 (Amalfi, Italy) [Konferenzveröffentlichung]

Müter, Michael ; Groll, André ; Freiling, Felix A structured approach to anomaly detection for in-vehicle networks. 92-98 In: 2010 Sixth International Conference on Information Assurance and Security (IAS 2010) : Atlanta, Georgia, USA, 23 - 25 August 2010 (2010) Piscataway, NJ IAS 2010 (Atlanta, GA) [Konferenzveröffentlichung]

Müter, Michael ; Freiling, Felix Model-based security evaluation of vehicular networking architectures. Gyires, Tibor 185-193 In: 2010 Ninth International Conference on Networks (ICN 2010) : Menuires, France, 11 - 16 April 2010 ; proceedings (2010) Piscataway, NJ ICN 2010 (Les Menuires, France) [Konferenzveröffentlichung]

Krontiris, Ioannis ; Freiling, Felix Integrating people-centric sensing with social networks: A privacy research agenda. Becker, Christian 620-623 In: 2010 8th IEEE International Conference on Pervasive Computing and Communications workshops : PerCom workshops 2010 ; Mannheim, Germany (2010) Piscataway, NJ SESOC 2010 (Mannheim, Germany) [Konferenzveröffentlichung]

Catrina, Octavian ; Saxena, Amitabh Secure computation with fixed-point numbers. Sion, Radu Lecture Notes in Computer Science 6052 35-50 In: Financial cryptography and data security : 14th International Conference, FC 2010, Tenerife, Canary Islands, Spain, January 25 - 28, 2010; revised selected papers (2010) Berlin [u.a.] FC 2010 (Tenerife, Spain) [Konferenzveröffentlichung]

Freiling, Felix ; Lambertz, Christian ; Majster-Cederbaum, Mila Modular Consensus Algorithms for the Crash-Recovery Model. Second International Workshop on Reliability, Availability, and Security (WRAS 2009) Hiroshima, Japan, December 2009; proceedings 287-292 In: 2009 International Conference on Parallel and Distributed Computing, Applications and Technologies : PDCAT 2009 ; Higashi-Hiroshima, Japan, 8 - 11 December 2009 ; [including workshop papers] (2009) Washington, DC [Konferenzveröffentlichung]

Stock, Ben ; Göbel, Jan Gerrit ; Engelberth, Markus ; Freiling, Felix ; Holz, Thorsten Walowdac - Analysis of a Peer-to-Peer Botnet. 2009 European Conference on Computer Network Defence (EC2ND), Milano, November 9-10, 2009 13-20 In: 2009 European Conference on Computer Network Defence (EC2ND) (2009) New York, NY (Milano, Italy) [Konferenzveröffentlichung]

Trinius, Philipp ; Holz, Thorsten ; Göbel, Jan Gerrit ; Freiling, Felix Visual Analysis of Malware Behavior (Short paper). 6th International Workshop on Visualization for Cyber Security, Atlantic City, NJ, USA, October 11, 2009 In: 6th International Workshop on Visualization for Cyber Security (2009) Piscataway, NJ (Atlantic City, NJ) [Konferenzveröffentlichung]

Böhme, Rainer ; Freiling, Felix ; Gloe, Thomas ; Kirchner, Matthias Multimedia Forensics is not Computer Forensics. Geradts, Zeno Lecture Notes in Computer Science 5718 90-103 In: Computational Forensics : Third International Workshop, IWCF 2009, The Hague, The Netherlands, August 13 - 14, 2009; proceedings (2009) Berlin [u.a.] [Konferenzveröffentlichung]

Göbel, Jan Gerrit ; Holz, Thorsten ; Trinius, Philipp Towards Proactive Spam Filtering (Extended Abstract). Flegel, Ulrich Lecture Notes in Computer Science 5587 36-47 In: Detection of intrusions and malware, and vulnerability assessment : 6th International Conference, DIMVA 2009, Como, Italy, July 9 - 10, 2009; proceedings (2009) Berlin [u.a.] [Konferenzveröffentlichung]

Badura, Thomas ; Becher, Michael Testing the Symbian OS Platform Security Architecture. Awan, Irfan The IEEE 23rd International Conference on Advanced Information Networking and Applications, AINA 2009, Bradford, United Kingdom, May 26-29, 2009 838-844 In: International Conference on Advanced Information Networking and Applications, 2009 : AINA '09 ; Bradford, United Kingdom, 26 - 29 May 2009 (2009) Piscataway, NJ [Konferenzveröffentlichung]

Krontiris, Ioannis ; Benenson, Zinaida ; Giannetsos, Thanassis ; Freiling, Felix ; Dimitriou, Tassos Cooperative intrusion detection in wireless sensor networks. Rödig, Utz Lecture Notes in Computer Science 5432 263-278 In: Wireless sensor networks : 6th European Conference, EWSN 2009, Cork, Ireland, February 11 - 13, 2009; proceedings (2009) Berlin [u.a.] EWSN 2009 (Cork, Ireland) [Konferenzveröffentlichung]

Moch, Christian ; Freiling, Felix The Forensic Image Generator Generator (Forensig2). Goebel, Oliver 78-93 In: Fifth International Conference on IT Security Incident Management and IT Forensics, 2009 : IMF '09 ; Stuttgart, Germany, 15 - 17 Sept. 2009 (2009) Piscataway, NJ [Konferenzveröffentlichung]

Hund, Ralf ; Hamann, Matthias ; Holz, Thorsten Towards Next-Generation Botnets. Proceedings of the 4th European Conference on Computer Network Defense (EC2ND 08) 33-40 In: 2008 European Conference on Computer Network Defense : (EC2ND) ; Dublin, Ireland, 11 - 12 December 2008 (2008) Piscataway, NJ [Konferenzveröffentlichung]

Freiling, Felix ; Holz, Thorsten ; Mink, Martin Reconstructing Peoples Lives: A Case Study in Teaching Forensic Computing. Göbel, Oliver GI-Edition : Lecture Notes in Informatics. Proceedings 140 125-142 In: IMF 2008 : IT Incident Management & IT-Forensics; proceedings of the 4th International Conference on IT Incident Management & IT-Forensics; September 23 - 25, 2008, Mannheim, Germany (2008) Bonn [Konferenzveröffentlichung]

Beek, Frank van der ; Mink, Martin Wie lehrt man IT-Sicherheit am Besten? Eine empirische Studie. Alkassar, Ammar GI-Edition : Lecture Notes in Informatics. Proceedings 128 499-511 In: Sicherheit 2008 : Sicherheit - Schutz und Zuverlässigkeit ; Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) ... ; 2. - 4. April 2008 im Saarbrücker Schloss (2008) Bonn [Konferenzveröffentlichung]

Freiling, Felix ; Becher, Michael Towards Dynamic Malware Analysis to Increase Mobile Device Security. Alkassar, Ammar GI-Edition : Lecture Notes in Informatics. Proceedings 128 423-433 In: Sicherheit 2008 : Sicherheit - Schutz und Zuverlässigkeit ; Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) ... ; 2. - 4. April 2008 im Saarbrücker Schloss (2008) Bonn [Konferenzveröffentlichung]

Ikinci, Ali ; Holz, Thorsten ; Freiling, Felix Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients. Alkassar, Ammar GI-Edition : Lecture Notes in Informatics. Proceedings 128 407-421 In: Sicherheit 2008 : Sicherheit - Schutz und Zuverlässigkeit ; Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) ... ; 2. - 4. April 2008 im Saarbrücker Schloss (2008) Bonn [Konferenzveröffentlichung]

Freiling, Felix ; Liebchen, Jens Iterative Kompromittierungsgraphverfeinerung als methodische Grundlage für Netzwerkpenetrationstests. Alkassar, Ammar GI-Edition : Lecture Notes in Informatics. Proceedings 128 435-447 In: Sicherheit 2008 : Sicherheit - Schutz und Zuverlässigkeit ; Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) ... ; 2. - 4. April 2008 im Saarbrücker Schloss (2008) Bonn [Konferenzveröffentlichung]

Göbel, Jan Gerrit ; Holz, Thorsten Rishi: Identifizierung von Bots durch Auswerten der IRC Nicknamen. Paulsen, Christian Sicherheit in vernetzten Systemen : 15. DFN Workshop D 1-16 In: 15. DFN-Workshop Sicherheit in Vernetzten Systemen : 13./14. Februar 2008 in Hamburg ; [Berichte ; DFN, Deutsches Forschungsnetz] (2008) Hamburg [Konferenzveröffentlichung]

Holz, Thorsten ; Gorecki, Christian ; Rieck, Konrad ; Freiling, Felix Measuring and Detecting Fast-Flux Service Networks. Proceedings of the Network and Distributed System Security Symposium, NDSS 2008, San Diego, California, USA, 10th-13th February 2008 257-268 In: Proceedings / 2008 Network and Distributed System Security Symposium : February 10 - 13, 2008, San Diego, California (2008) Reston, Va. [Konferenzveröffentlichung]

Gorecki, Christian Truman Box - Transparente Emulation von Internetdiensten. Paulsen, Christian Sicherheit in vernetzten Systemen: 15. DFN Workshop E [1-19] In: 15. DFN-Workshop Sicherheit in Vernetzten Systemen : 13./14. Februar 2008 in Hamburg ; [Berichte ; DFN, Deutsches Forschungsnetz] (2008) Hamburg [Konferenzveröffentlichung]

Benenson, Zinaida ; Freiling, Felix ; Cholewinski, Peter M. Advanced Evasive Data Storage in Sensor Networks. 8th International Conference on Mobile Data Management : MDM '07, Mannheim, Germany, May 7-11, 2007 ; proceedings 146-151 In: Proceedings / 2007 International Conference on Mobile Data Management : MDM 2007, May 7 - 11, 2007, Mannheim, Germany (2007) Piscataway, NJ [u.a.] [Konferenzveröffentlichung]

Zhuge, Jianwei ; Holz, Thorsten ; Han, Xinhui ; Song, Chengyu ; Zou, Wei Collecting Autonomous Spreading Malware Using High-Interaction Honeypots. Qing, Sihan Lecture Notes in Computer Science 4861 438-451 In: Information and communications security : 9th International Conference, ICICS 2007, Zhengzhou, China, December 12 - 15, 2007; proceedings (2007) Berlin [u.a.] [Konferenzveröffentlichung]

Biely, Martin ; Hutle, Martin ; Draque Penso, Lucia ; Widder, Josef Relating Stabilizing Timing Assumptions to Stabilizing Failure Detectors Regarding Solvability and Efficiency. Masuzawa, Toshimitsu Lecture Notes in Computer Science 4838 4-20 In: Stabilization, safety, and security of distributed systems : 9th International Symposium, SSS 2007, Paris, France, November 14 - 16, 2007; proceedings (2007) Berlin [u.a.] [Konferenzveröffentlichung]

Freiling, Felix ; Jhumka, Arshad Global Predicate Detection in Distributed Systems with Small Faults. Masuzawa, Toshimitsu Lecture Notes in Computer Science 4838 296-310 In: Stabilization, safety, and security of distributed systems : 9th International Symposium, SSS 2007, Paris, France, November 14 - 16, 2007; proceedings (2007) Berlin [u.a.] [Konferenzveröffentlichung]

Freiling, Felix ; Schwittay, Bastian Towards Reliable Rootkit Detection in Live Response. Frings, Sandra GI-Edition : Lecture Notes in Informatics. Proceedings 114 125-144 In: IMF 2007 : IT-Incident Management and IT-Forensics; proceedings of the 3rd International Conference on IT-Incident Management &IT-Forensics; September 11 -13, 2007, Stuttgart, Germany (2007) Bonn [Konferenzveröffentlichung]

Freiling, Felix ; Dornseif, Maximillian ; Daiya, Harish Testing Forensic Hash Tools on Sparse Files. IMF 2007 : IT-Incident Management and IT-Forensics; proceedings of the 3rd International Conference on IT-Incident Management &IT-Forensics ; September 11 -13, 2007, Stuttgart, Germany In: IMF 2007 : IT-Incident Management and IT-Forensics; proceedings of the 3rd International Conference on IT-Incident Management &IT-Forensics ; September 11 -13, 2007, Stuttgart, Germany (2007) Bonn [Konferenzveröffentlichung]

Freiling, Felix ; Schwittay, Bastian A Common Process Model for Incident Response and Computer Forensics. Frings, Sandra GI-Edition : Lecture Notes in Informatics. Proceedings 114 19-40 In: IMF 2007 : IT-Incident Management and IT-Forensics; proceedings of the 3rd International Conference on IT-Incident Management &IT-Forensics; September 11 -13, 2007, Stuttgart, Germany (2007) Bonn [Konferenzveröffentlichung]

Freiling, Felix ; Majuntke, Matthias ; Mittal, Neeraj On Detecting Termination in the Crash-Recovery Model. Euro-Par 2007, parallel processing : 13th International Euro-Par Conference, Rennes, France, August 28 - 31, 2007; proceedings In: Euro-Par 2007, parallel processing : 13th International Euro-Par Conference, Rennes, France, August 28 - 31, 2007; proceedings (2007) Berlin [u.a.] [Konferenzveröffentlichung]

Göbel, Jan Gerrit ; Holz, Thorsten ; Willems, Carsten Measurement and Analysis of Autonomous Spreading Malware in a University Environment. Hämmerli, Bernhard M. Lecture Notes in Computer Science 4579 109-128 In: Detection of intrusions and malware, and vulnerability assessment : 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12 - 13, 2007; proceedings (2007) Berlin [u.a.] [Konferenzveröffentlichung]

Mink, Martin Ist Angriff besser als Verteidigung? Der richtige Weg für IT-Sicherheitsausbildung. Innovationsmotor IT-Sicherheit : [Tagungsband zum 10. Deutschen IT-Sicherheitskongress] / Bundesamt für Sicherheit in der Informationstechnik 339-352 In: Innovationsmotor IT-Sicherheit : [Tagungsband zum 10. Deutschen IT-Sicherheitskongress] (2007) Gau-Algesheim [Konferenzveröffentlichung]

Krontiris, Ioannis ; Dimitriou, Tassos ; Freiling, Felix Towards an Intrusion Detection System in Wireless Sensor Networks. 13th European Wireless Conference, 1-4th April, Paris, France; proceedings 1-7 In: European Wireless 2007 : 13th European Wireless Conference ; Paris, April 1-4, 2007 ; proceedings (2007) Paris [Konferenzveröffentlichung]

Holz, Thorsten ; Göbel, Jan Gerrit Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation. First Workshop on Hot Topics in Understanding Botnets, HotBots 07, Cambridge, Mass. April 11–13, 2007; proceedings In: HotBots’07: Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets (2007) (Cambridge, Mass.) [Konferenzveröffentlichung]

Cortiñas, Roberto ; Freiling, Felix ; Ghajar-Azadanlou, Marjan ; Lafuente, Alberto ; Larrea, Mikel ; Draque Penso, Lucia ; Soraluze, Iratxe Secure failure detection in TrustedPals. Masuzawa, Toshimitsu Lecture Notes in Computer Science 4838 173-188 In: Stabilization, safety, and security of distributed systems : 9th International Symposium, SSS 2007, Paris, France, November 14 - 16, 2007; proceedings (2007) Berlin [u.a.] Symposium on Self-Stabilizing Systems 2007 (Paris, France) [Konferenzveröffentlichung]

Delporte-Gallet, Carole ; Fauconnier, Hugues ; Freiling, Felix ; Draque Penso, Lucia ; Tielmann, Andreas From Crash-Stop to Permanent Omission: Automatic Transformations and Weakest Failure Detectors. Pelc, Andrzej Lecture Notes in Computer Science 4731 165-178 In: Distributed computing : 21st International Symposium, DISC 2007, Lemesos, Cyprus, September 24 - 26, 2007; proceedings (2007) Berlin [u.a.] [Konferenzveröffentlichung]

Holz, Thorsten Learning More About Attack Patterns With Honeypots. GI-Edition : Lecture Notes in Informatics. Proceedings 77 30-41 In: Sicherheit 2006 : Konferenzband der 3. Jahrestagung [des] Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI); Otto-von-Guericke-Universität Magdeburg, 20. - 22. Februar (2006) Bonn [Konferenzveröffentlichung]

Holz, Thorsten ; Wicherski, Georg Effektives Sammeln von Malware mit Honeypots. Paulsen, Christian 13. Workshop Sicherheit in vernetzten Systemen : 1./2. März 2006 in Hamburg; [Berichte; DFN, Deutsches Forschungsnetz] / DFN CERT G In: 13. Workshop Sicherheit in vernetzten Systemen : 1./2. März 2006 in Hamburg; [Berichte; DFN, Deutsches Forschungsnetz] (2006) Hamburg [Konferenzveröffentlichung]

Holz, Thorsten Learning More About Attack Patterns With Honeypots. Dittmann, Jana GI-Edition : Lecture Notes in Informatics. Proceedings 77 30-41 In: Sicherheit 2006 : Konferenzband der 3. Jahrestagung [des] Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI); Otto-von-Guericke-Universität Magdeburg, 20. - 22. Februar 2006 (2006) Bonn [Konferenzveröffentlichung]

Nasserian, Samad ; Tsudik, Gene Revisiting Oblivious Signature-Based Envelopes : New Constructs and Properties. Di Crescenzo, Giovanni Lecture Notes in Computer Science 4107 221-235 In: Financial Cryptography and Data Security : 10th International Conference, FC 2006, Anguilla, British West Indies, February 27 - March 2, 2006; revised selected papers (2006) Berlin [u.a.] FC 2006 (Anguilla, British West Indies) [Konferenzveröffentlichung]

Becher, Alexander ; Benenson, Zinaida ; Dornseif, Maximillian Tampering with Motes : Real-World Attacks on Wireless Sensor Networks. In: Sicherheit 2006 : Haupttagung "Sicherheit - Schutz und Zuverlässigkeit"; Konferenzband der 3. Jahrestagung [des] Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI); Otto-von-Guericke-Universität Magdeburg, 20. - 22. Februar 2006 (2006) Bonn [Konferenzveröffentlichung]

Achtzehn, Andreas ; Benenson, Zinaida ; Rohner, Christian Implementing Agreement Protocols in Sensor Networks. Proceedings / 2nd IEEE International Workshop on Wireless and Sensor Networks Security, WSNS'06, October 9 -12, 2006, Vancouver, Canada 858-863 In: 2006 IEEE International Conference on Mobile Ad-hoc and Sensor Systems : [Vancouver, B.C, Canada], 9-12 Oct. 2006; proceedings (2006) Piscataway, NJ [Konferenzveröffentlichung]

Benenson, Zinaida ; Freiling, Felix ; Pfitzmann, Birgit ; Rohner, Christian ; Waidner, Michael Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. Buttyán, Levente Lecture Notes in Computer Science 4357 165-178 In: Security and privacy in ad-hoc and sensor networks : Third European Workshop, ESAS 2006, Hamburg, Germany, September 20 - 21, 2006; revised selected papers (2006) Berlin [u.a.] [Konferenzveröffentlichung]

Freiling, Felix ; Mittal, Neeraj ; Phaneesh, Kuppahalli L. Safe Termination Detection in an Asynchronous Distributed System When Processes May Crash and Recover. Principles of Distributed Systems 10th International Conference, OPODIS 2006, Bordeaux, France, December 12 - 15, 2006; proceedings 126-141 In: Principles of Distributed Systems 10th International Conference, OPODIS 2006, Bordeaux, France, December 12 - 15, 2006; proceedings (2006) Berlin [u.a.] [Konferenzveröffentlichung]

Anderson, Philip ; Dornseif, Maximillian ; Freiling, Felix ; Holz, Thorsten ; Irons, Alastair ; Laing, Christopher ; Mink, Martin A Comparative Study of Teaching Forensics at a University Degree Level. Göbel, Oliver GI-Edition : Lecture Notes in Informatics. Proceedings 97 116-127 In: IMF 2006 : IT-Incident Management and IT-Forensics; conference proceedings; October 18th-19th, 2006, Stuttgart, Germany (2006) Bonn [Konferenzveröffentlichung]

Mink, Martin ; Freiling, Felix Is Attack Better Than Defense? Teaching Information Security the Right Way. 3rd annual Conference on Information Security Curriculum Development, Conference on Information Security Curriculum Development 2006; proceedings 44-48 In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development : InfoSecCD '06 ; September 22 - 23, 2006, Kennesaw, Georgia, USA (2006) New York, NY [u.a.] [Konferenzveröffentlichung]

Baecher, Paul ; Koetter, Markus ; Holz, Thorsten ; Dornseif, Maximillian ; Freiling, Felix The Nepenthes Platform: An Efficient Approach to Collect Malware. Zamboni, Diego Lecture Notes in Computer Science 4219 165-184 In: Recent advances in intrusion detection : 9th International Symposium, RAID 2006, Hamburg, Germany, September 20 - 22, 2006; proceedings (2006) Berlin [u.a.] [Konferenzveröffentlichung]

Fort, Milan ; Freiling, Felix ; Draque Penso, Lucia ; Benenson, Zinaida ; Kesdogan, Dogan TrustedPals: Secure Multiparty Computation Implemented with Smart Cards. Gollmann, Dieter Lecture Notes in Computer Science 4189 34-48 In: Computer security - ESORICS 2006 : 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18 - 20, 2006; proceedings (2006) Berlin [u.a.] [Konferenzveröffentlichung]

Böhme, Rainer ; Holz, Thorsten The Effect of Stock Spam on Financial Markets. 5th Workshop on the Economics of Information Security, WEIS 2006, Robinson College, Univ. of Cambridge, England, 26-28 June 2006; proceedings 1-24 In: 5th Annual Workshop on the Economics of Information Security, WEIS 2006, Robinson College, University of Cambridge, England, UK, June 26-28, 2006 (2006) Cambridge [Konferenzveröffentlichung]

Dornseif, Maximillian ; Freiling, Felix ; Gedicke, Nils ; Holz, Thorsten Design and Implementation of the Honey-DVD. 7th Annual IEEE Information Assurance Workshop, 21-23 June 2006, United States Military Academy, West Point, New York 231-238 In: 7th Annual IEEE Information Assurance Workshop : 21-23 June 2006, United States Military Academy, West Point, New York : the West Point Workshop (2006) Piscataway, NJ [Konferenzveröffentlichung]

Benenson, Zinaida ; Freiling, Felix ; Hammerschmidt, Ernest ; Lucks, Stefan ; Pimenidis, Lexi Authenticated Query Flooding in Sensor Networks. Security and privacy in dynamic environments : proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden In: Security and privacy in dynamic environments : proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden (2006) New York, NY [u.a.] [Konferenzveröffentlichung]

Dornseif, Maximillian ; Benenson, Zinaida ; Becher, Michael ; Lucks, Stefan ; Hammerschmidt, Ernest ; Pimenidis, Lexi Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. Security in pervasive computing : Third International Conference, SPC 2006, York, UK, April 18 - 21, 2006; proceedings In: Security in pervasive computing : Third International Conference, SPC 2006, York, UK, April 18 - 21, 2006; proceedings (2006) Berlin [u.a.] [Konferenzveröffentlichung]

Benenson, Zinaida ; Draque Penso, Lucia ; Freiling, Felix ; Holz, Thorsten ; Kesdogan, Dogan Safety, Liveness, and Information Flow: Dependability Revisited. ARCS'06 : 19th International Conference on Architecture of Computing Systems; Workshop proceedings; March 16, 2006, Frankfurt am Main In: ARCS'06 : 19th International Conference on Architecture of Computing Systems; Workshop proceedings; March 16, 2006, Frankfurt am Main (2006) Bonn [Konferenzveröffentlichung]

Warns, Timo ; Freiling, Felix ; Hasselbring, Wilhelm Solving consensus using structural failure models. Proceedings / 25th Symposium on Reliable Distributed Systems, SRDS 2006, 2-4 October 2006, Leeds, UK 212-224 In: Proceedings - 25th IEEE Symposium on Reliable Distributed Systems, SRDS 2006 : 2 - 4 October 2006, Leeds, United Kingdom (2006) Los Alamitos, Calif. [u.a.] [Konferenzveröffentlichung]

Pouget, Fabien ; Holz, Thorsten A Pointillist Approach for Comparing Honeypots. Julisch, Klaus Lecture Notes in Computer Science 3548 51-68 In: Detection of Intrusions and Malware and Vulnerability Assessment : Second International Conference, DIMVA 2005, Vienna, Austria; proceedings (2005) Berlin [u.a.] [Konferenzveröffentlichung]

Benenson, Zinaida ; Freiling, Felix ; Kesdogan, Dogan An Algorithmic Framework of Robust Access Control in Wireless Sensor Networks. Cayirci, Erda EWSN 2005 CFP : 2nd European Workshop on Wireless SensorNetworks, Istanbul, Turkey, January 31 - February 2, 2005 158-165 In: Proceedings on the Second European Workshop on Wireless Sensor Networks, Istanbul, Turkey (2005) Piscataway, NJ EWSN 2005 CFP [Konferenzveröffentlichung]

Holz, Thorsten ; Raynal, Frederic Detecting Honeypots and Other Suspicious Environments. Proceedings / The 6th IEEE Information Assurance Workshop, 15-17 June 2005, United States Military Academy, Westpoint, New York 29-36 In: Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics (SMC) Information Assurance Workshop : West Point, New York ; workshop papers (2005) Piscataway, NJ [Konferenzveröffentlichung]

Benenson, Zinaida ; Freiling, Felix ; Kesdogan, Dogan Secure Multi-Party Computation with Security Modules. Federrath, Hannes GI-Edition : Lecture Notes in Informatics. Proceedings 62 41-52 In: Sicherheit 2005 : Beiträge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI); 5. - 8. April 2005 in Regensburg (2005) Bonn [Konferenzveröffentlichung]

Freiling, Felix ; Delporte-Gallet, Carole ; Fauconnier, Hugues Revisiting Failure Detection and Consensus in Omission Failure Environments. Theoretical aspects of computing - ICTAC 2005 : Second International Colloquium, Hanoi, Vietnam, October 17 - 21, 2005; proceedings 394-408 In: Theoretical aspects of computing - ICTAC 2005 : Second International Colloquium; proceedings (2005) Berlin [u.a.] (Hanoi, Vietnam) [Konferenzveröffentlichung]

Avoine, Gildas ; Freiling, Felix ; Guerraoui, Rachid ; Vukolic, Marko Gracefully Degrading Fair Exchange with Security Modules. Dal Cin, Mario Lecture Notes in Computer Science 3463 55-71 In: Dependable computing - EDCC 2005 : 5th European Dependable Computing Conference, Budapest, Hungary, April 20 - 22, 2005; proceedings (2005) Berlin [u.a.] [Konferenzveröffentlichung]

Holz, Thorsten ; Dornseif, Maximillian On the limits of deception. Heute schon das Morgen sehen : 9. DFN-Arbeitstagung über Kommunikationsnetze in Düsseldorf 235-252 In: Heute schon das Morgen sehen : 9. DFN-Arbeitstagung über Kommunikationsnetze in Düsseldorf (2005) Bonn [Konferenzveröffentlichung]

Mink, Martin ; Freiling, Felix ; Dornseif, Maximillian ; Pimenidis, Lexi Teaching Data Security at University Degree Level. Miloslavskaya, Natalia Proceedings of the IFIP TC11 WG11.3 Fourth World Conference on Information Security Education, Fourth World Conference on Information Security Education (WISE4) 213-222 In: Success through information security knowledge : proceedings of the IFIP TC11 WG 11.8 Fourth World Conference Information Security Education, (WISE4), 18-20 May 2005, Moscow, Russia (2005) Moscow [Konferenzveröffentlichung]

Freiling, Felix ; Herlihy, Maurice ; Draque Penso, Lucia Optimal Randomized Fair Exchange with Secret Shared Coins. Anderson, James H. Lecture Notes in Computer Science 3974 61-72 In: Principles of distributed systems : 9th International Conference, OPODIS 2005, Pisa, Italy, December 12 - 14, 2005; revised selected paper (2005) Berlin [u.a.] [Konferenzveröffentlichung]

Benenson, Zinaida ; Gedicke, Nils ; Raivio, Ossi Realizing Robust User Authentication in Sensor Networks. Technical report / Swedish Institute of Computer Science 2005,9 In: Proceedings of the First REALWSN 2005 Workshop on Real-World Wireless Sensor Networks : Stockholm, Sweden, 20 - 21 June 2005 (2005) Stockholm [Konferenzveröffentlichung]

Benenson, Zinaida Authenticated Queries in Sensor Networks. Security and privacy in ad-hoc and sensor networks : Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13 - 14, 2005; revised selected papers In: Security and privacy in ad-hoc and sensor networks : Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13 - 14, 2005; revised selected papers (2005) Berlin [u.a.] [Konferenzveröffentlichung]

Freiling, Felix ; Ghosh, Sukumar Code Stabilization. Herman, Ted Lecture Notes in Computer Science 3764 128-139 In: Self-stabilizing systems : 7th International Symposium, SSS 2005, Barcelona, Spain, October 26 - 27, 2005; proceedings (2005) Berlin [u.a.] [Konferenzveröffentlichung]

Benenson, Zinaida ; Cholewinski, Peter M. ; Freiling, Felix Simple Evasive Data Storage in Sensor Networks. Zheng, Si-Qing First International Workshop on Distributed Algorithms and Applications for Wireless and Mobile Systems, DAAWMS 2005, November 2005, Phoenix, Arizona ; proceedings 779-784 In: Proceedings of the 17th IASTED International Conference on Parallel and Distributed Computing and Systems : November 14 - 16, 2005, Phoenix, AZ, USA (2005) Anaheim, Calif. [u.a.] [Konferenzveröffentlichung]

Freiling, Felix ; Jhumka, Arshad Automating the addition of fail-safe fault-tolerance : Beyond fusion-closed specifications. Lakhnech, Yassine Lecture Notes in Computer Science 3253 183-198 In: Formal techniques, modelling and analysis of timed and fault-tolerant systems : FTRTFT 2004, Grenoble, France, September 22 - 24, 2004; proceedings (2004) Berlin [u.a.] [Konferenzveröffentlichung]

Holz, Thorsten ; Freiling, Felix ; Dornseif, Maximillian Ermittlung von Verwundbarkeiten mit elektronischen Ködern. Detection of intrusions and malware & vulnerability assessment : GI Special Interest Group SIDAR Workshop, DIMVA 2004, Dortmund, Germany, July 6 - 7, 2004 129-141 In: Detection of intrusions and malware & vulnerability assessment : GI Special Interest Group SIDAR Workshop, DIMVA 2004, Dortmund, Germany, July 6 - 7, 2004 (2004) Bonn [Konferenzveröffentlichung]

Vukolic, Marko ; Guerraoui, Rachid ; Freiling, Felix ; Avoine, Gildas Modern Security with Traditional Distributed Algorithms. Proceedings of the Workshop in Secure Multiparty Protocols : SMP 2004 ; 7-8 October 2004 1-4 In: Workshop on Secure Multiparty Protocols : SMP 2004 ; 7-8 October 2004; Amsterdam, The Netherlands (2004) Zurich [Konferenzveröffentlichung]

Klein, Christian ; Holz, Thorsten ; Dornseif, Maximillian NoSEBrEaK - Attacking Honeynets. Proceedings of the 5th Annual IEEE Information Assurance Workshop, Westpoint, 10.-11. June 2004 In: Proceedings of the 5th Annual IEEE Information Assurance Workshop, Westpoint, 10.-11. June 2004 (2004) West Point, NY [Konferenzveröffentlichung]

Benenson, Zinaida ; Freiling, Felix ; Kesdogan, Dogan User authentication in sensor networks (extended abstract). Dadam, Peter GI-Edition : Lecture Notes in Informatics. Proceedings 51 385-389 In: Informatik 2004 : 34. Jahrestagung der Gesellschaft für Informatik; 2: Informatik verbindet; Workshop on Sensor Networks (2004) Bonn [Konferenzveröffentlichung]

Schiele, Robert Building and Using a Cross Development Tool Chain. Proceedings of the GCC Developers Summit 2003, GCC Summit, Ottawa, 24.-27.05.2003 213-222 In: Proceedings of the GCC Developers Summit 2003, GCC Summit, Ottawa, 24.-27.05.2003 (2003) Ottawa, Ont. [Konferenzveröffentlichung]

Mühl, Gero ; Fiege, Ludger ; Freiling, Felix ; Buchmann, Alejandro Evaluating Advanced Routing Algorithms for Content-Based Publish/Subscribe Systems. Boukerche, A. The Tenth IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems 167-176 In: Proceedings of the 10th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems : MASCOTS '02 (2002) New York, NY [u.a.] [Konferenzveröffentlichung]

Freiling, Felix ; Pleisch, Stefan Failure detection sequencers : Necessary and sufficient information about failures to solve predicate detection. Malkhi, Dahlia Lecture Notes in Computer Science 2508 280-294 In: Distributed computing : 16th international conference, DISC 2002, Toulouse, France, October 28 - 30, 2002; proceedings (2002) Berlin [u.a.] [Konferenzveröffentlichung]

Freiling, Felix Fehlermodellierung ohne explizite Fehlerzustände. Brinkschulte, Uwe International Conference on Architecture of Computing Systems - ARCS 2002 71-80 In: Trends in network and pervasive computing ; workshop proceedings / International Conference on Architecture of Computing Systems, ARCS 2002, Karlsruhe, Germany, April 8 - 12, 2002 (2002) Berlin [Konferenzveröffentlichung]

Freiling, Felix ; Pleisch, Stefan Failure Detection Sequencers: Necessary and Sufficient Information about Failures to Solve Predicate Detection. Malkhi, Dahlia Lecture Notes in Computer Science 2508 280-294 In: Distributed computing : 16th international conference, DISC 2002, Toulouse, France, October 28 - 30, 2002; proceedings (2002) Berlin [u.a.] [Konferenzveröffentlichung]

Fiege, Ludger ; Mühl, Gero ; Freiling, Felix A Modular Approach to Build Structured Event-based Systems. Lamont, Gary Proceedings of the 2002 ACM Symposium on Applied Computing 385-392 In: Applied computing 2002 : proceedings of the 2002 ACM Symposium on Applied Computing ; Universidad Carlos III De Madrid, Madrid, Spain, March 11 - 14, 2002 (2001) New York, NY [Konferenzveröffentlichung]

Pleisch, Stefan ; Freiling, Felix (Im)Possibilities of predicate detection in crash-affected systems. Datta, Ajoy K. Lecture Notes in Computer Science 2194 98-113 In: Self-stabilizing systems : 5th international workshop; proceedings; WSS 2001, Lisbon, Portugal, October 1 - 2, 2001 (2001) Berlin [u.a.] [Konferenzveröffentlichung]

Kloppenburg, Sven ; Freiling, Felix Consistent Detection of Global Predicates Under a Weak Fault Assumption. Proceedings of the 19th IEEE Symposium on Reliable Distributed Systems 94-103 In: Proceedings / the 19th IEEE Symposium on Reliable Distributed Systems : Nürnberg, Germany, October 16 - 18, 2000 (2000) Los Alamitos, Calif. [u.a.] [Konferenzveröffentlichung]

Theisen, Marc ; Freiling, Felix Correctness Preserving Transformations for the Design of Parallelized Low-Power Systems. Mehlhorn, Kurt Informatik 30 165-180 In: Informatik 2000 : Neue Horizonte im neuen Jahrhundert; Berlin, 19. - 22. September 2000 (2000) Berlin [Konferenzveröffentlichung]

Freiling, Felix Formale Grundlagen der Fehlertoleranz. Informatiktage 1999 137-139 In: Informatiktage 1999 : fachwissenschaftlicher Informatik-Kongreß, 12. und 13. November 1999 im Neuen Kloster Bad Schussenried (2000) Leinfelden-Echterdingen Informatiktage 1999 (Bad Schussenried, Germany) [Konferenzveröffentlichung]

Theel, Oliver ; Freiling, Felix An Exercise in Proving Convergence through Transfer Functions. Arora, Anish Proceedings of the IEEE Workshop on Self-Stabilizing Systems 41-47 In: Workshop on Self-Stabilizing Systems : proceedings / 19th International Conference on Distributed Computing Systems : May 31 - June 4, 1999, Austin, Texas (1999) Los Alamitos, Calif. [u.a.] [Konferenzveröffentlichung]

Freiling, Felix An exercise in systematically deriving fault-tolerance specifications. Proceedings of the Third European Research Seminar on Advances in Distributed Systems 99-102 In: Proceedings of the Third ERSADS '99 : European Research Seminar on Advances in Distributed Systems Spring School and Workshop Madeira Island - Portugal. 23-28 April 1999 (1999) [Lisboa] [Konferenzveröffentlichung]

Freiling, Felix ; Pagnia, Henning Self-stabilizing Load Distribution for Replicated Servers on a Per-Access Basis. Arora, Anish Proceedings of the IEEE Workshop on Self-Stabilizing Systems 102-109 In: Workshop on Self-Stabilizing Systems : proceedings / 19th International Conference on Distributed Computing Systems : May 31 - June 4, 1999, Austin, Texas (1999) Los Alamitos, Calif. [u.a.] [Konferenzveröffentlichung]

Theisen, Marc ; Freiling, Felix Transformationen zur paralleliserten und fehlertoleranten Informationsverarbeitung. Beiersdörfer, Kurt INFORMATIK'99, Tagungsband der GI-Jahrestagung, Sektion: Junge Informatik 207-215 In: Informatik '99 : Informatik überwindet Grenzen; 29. Jahrestagung der Gesellschaft für Informatik, Paderborn, 5. - 9. Oktober 1999 (1999) Berlin [u.a.] [Konferenzveröffentlichung]

Stetter, Franz Trends in der Informationstechnologie. Veröffentlichungen des Instituts für Mittelstandsforschung. Grüne Reihe 37 56-61 In: Neue Informations- und Kommunikationstechniken in KMU : am 26. November 1998 (1998) Mannheim [Konferenzveröffentlichung]

Pagnia, Henning ; Freiling, Felix Enhancing the fault tolerance of replication : another exercise in constrained convergence. Proceedings of the 28th Annual International Symposium on Fault-Tolerant Computing 29-30 In: Proceedings of the 28th Annual International Symposium on Fault-Tolerant Computing (1998) Cambridge [Konferenzveröffentlichung]

Theel, Oliver ; Freiling, Felix Exploiting Control Theory for Proving the Stability of Distributed Algorithms. Proceedings of the 28th Annual International Symposium on Fault-Tolerant Computing 62 In: Digest of papers / Twenty-Eighth Annual International Symposium on Fault Tolerant Computing : June 23 - 27, 1998, Munich, Germany (1998) Los Alamitos, Calif. [u.a.] [Konferenzveröffentlichung]

Theel, Oliver ; Freiling, Felix On proving the stability of distributed algorithms: self-stabilization vs. control theory. Bajic, Vladimir B. Proceedings of the International Systems, Signals, Control, Computers Conference, (SSCC'98), Durban, South Africa 3 58-66 In: Proceedings of the International Conference on Systems, Signals, Control, Computers (SSCC'98) (1998) Durban [Konferenzveröffentlichung]

Arbeitspapier

Moch, Christian ; Freiling, Felix (2009) The Forensic Image Generator Generator (Forensig2). Mannheim [Arbeitspapier]

Dornseif, Maximillian ; Freiling, Felix ; Holz, Thorsten ; Mink, Martin (2005) An Offensive Approach to Teaching Information Security : "Aachen Summer School Applied IT Security". Aachener Informatik Berichte Aachen 05-02 [Arbeitspapier]

Freiling, Felix ; Holz, Thorsten ; Wicherski, Georg (2005) Botnet Tracking : Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks. Aachener Informatik Berichte Aachen 05-07 Nr.200 [Arbeitspapier]

Kursawe, Klaus ; Freiling, Felix (2005) Byzantine Fault Tolerance on General Hybrid Adversary Structures. Aachener Informatik Berichte Aachen 05-09 [Arbeitspapier]

Mittal, Neeraj ; Venkatesan, Subbarayan ; Freiling, Felix ; Draque Penso, Lucia (2005) Efficient Reductions for Wait-Free Termination Detection in Faulty Distributed Systems. Aachener Informatik Berichte Aachen 05-12 [Arbeitspapier]

Benenson, Zinaida ; Freiling, Felix (2005) On the Feasibility and Meaning of Security in Sensor Networks. Technical report / Department Of Computer Science Aachen 48 [Arbeitspapier]

Kursawe, Klaus ; Guerraoui, Rachid ; Freiling, Felix ; Avoine, Gildas ; Vaudenay, Serge ; Vukolic, Marko (2004) Reducing Fair Exchange to Atomic Commit. Technical report / Ecole Polytechnique Fédérale, Swiss Federal Institute of Technology (EPFL) Lausanne 11 [Arbeitspapier]

Freiling, Felix ; Guerraoui, Rachid ; Kouznetsov, Petr (2004) The CHT play : An Informal Note on the Necessary Part of the Proof that Ω is the Weakest Failure Detector for Consensus. Technical Report / Swiss Federal Institute of Technology (EPFL), School of Computer and Communication Sciences Lausanne 52 [Arbeitspapier]

Jhumka, Arshad ; Freiling, Felix ; Fetzer, Christof ; Suri, Neeraj (2002) On Systematic Design of Fast and Perfect Detectors. Technical Report / Swiss Federal Institute of Technology (EPFL), School of Computer and Communication Sciences Lausanne 200263 [Arbeitspapier]

Freiling, Felix ; Pleisch, Stefan (2001) (Im)Possibilities of Predicate Detection in Crash-Affected Systems using Interrupt-Style Failure Detectors. Darmstadt TR-01 [Arbeitspapier]

Freiling, Felix ; Kloppenburg, Sven (2000) Consistent detection of global predicates in asynchronous systems with crash failures. Mannheim [Arbeitspapier]

Voelzer, Hagen ; Freiling, Felix (2000) Redundancy in space in fault-tolerant systems. Technical report TUD-BS Darmstadt 00-06 [Arbeitspapier]

Mantel, Heiko ; Freiling, Felix (1999) A case study in the mechanical verification of fault tolerance. Technical report TUD-BS Darmstadt 99-08 [Arbeitspapier]

Freiling, Felix ; Wolfram, Armin (1999) Fehlererkennung und Fehlerdiagnose für verlässliche Systeme: Automatisierungstechnik vs. verteilte Systeme. Technischer Bericht TUD-BS Darmstadt 99-03 [Arbeitspapier]

Freiling, Felix (1999) A Survey of Transformational Approaches to the Specification and Verification of Fault-Tolerant Systems. Technical report TUD-BS Darmstadt 99-04 [Arbeitspapier]

Freiling, Felix (1998) Fundamentals of fault-tolerant distributed computing in asynchronous environments. Technical report TUD-BS Darmstadt 98-02 [Arbeitspapier]

Freiling, Felix (1998) Specifications for Fault Tolerance: A Comedy of Failures. Technical report TUD-BS Darmstadt 98-03 [Arbeitspapier]

Freiling, Felix (1998) The PretzelBook. TU Darmstadt, Fachgebiet Systemprogrammierung Darmstadt [Arbeitspapier]

Abschlussarbeit

Freiling, Felix (1997) Fehlertolerante Replikation von Diensten mit schwacher Konsistenz mittels selbststabilisierender verteilter Algorithmen. Darmstadt [Abschlussarbeit]

Diese Liste wurde am Tue Dec 24 02:07:35 2024 CET automatisch erstellt.