Back to overview
Export results as [feed] RSS 1.0 [feed] RSS 2.0
Order by: Document Type | Year of publication | No order
Number of items: 12.

Book

Göbel, Jan Gerrit ; Dewald, Andreas (2011) Client-Honeypots : Exploring Malicious Websites. München [Book]

Doctoral dissertation

Göbel, Jan Gerrit (2011) Large-Scale Detection and Measurement of Malicious Content. Open Access None [Doctoral dissertation]
[img]
Preview

Conference or workshop publication

Göbel, Jan Gerrit Amun: automatic capturing of malicious software. Freiling, Felix GI-Edition : Lecture Notes in Informatics. Proceedings 170 177-190 In: Sicherheit 2010 : Sicherheit, Schutz und Zuverlässigkeit ; Konferenzband der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5. - 7. Oktober 2010 in Berlin (2010) Bonn Sicherheit 2010 (Berlin, Germany) [Conference or workshop publication]

Göbel, Jan Gerrit ; Trinius, Philipp Towards optimal sensor placement strategies for early warning systems. Freiling, Felix GI-Edition : Lecture Notes in Informatics. Proceedings 170 191-204 In: Sicherheit 2010 : Sicherheit, Schutz und Zuverlässigkeit ; Konferenzband der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5. - 7. Oktober 2010 in Berlin (2010) Bonn Sicherheit 2010 (Berlin, Germany) [Conference or workshop publication]

Stock, Ben ; Göbel, Jan Gerrit ; Engelberth, Markus ; Freiling, Felix ; Holz, Thorsten Walowdac - Analysis of a Peer-to-Peer Botnet. 2009 European Conference on Computer Network Defence (EC2ND), Milano, November 9-10, 2009 13-20 In: 2009 European Conference on Computer Network Defence (EC2ND) (2009) New York, NY (Milano, Italy) [Conference or workshop publication]

Trinius, Philipp ; Holz, Thorsten ; Göbel, Jan Gerrit ; Freiling, Felix Visual Analysis of Malware Behavior (Short paper). 6th International Workshop on Visualization for Cyber Security, Atlantic City, NJ, USA, October 11, 2009 In: 6th International Workshop on Visualization for Cyber Security (2009) Piscataway, NJ (Atlantic City, NJ) [Conference or workshop publication]

Göbel, Jan Gerrit ; Holz, Thorsten ; Trinius, Philipp Towards Proactive Spam Filtering (Extended Abstract). Flegel, Ulrich Lecture Notes in Computer Science 5587 36-47 In: Detection of intrusions and malware, and vulnerability assessment : 6th International Conference, DIMVA 2009, Como, Italy, July 9 - 10, 2009; proceedings (2009) Berlin [u.a.] [Conference or workshop publication]

Göbel, Jan Gerrit ; Holz, Thorsten Rishi: Identifizierung von Bots durch Auswerten der IRC Nicknamen. Paulsen, Christian Sicherheit in vernetzten Systemen : 15. DFN Workshop D 1-16 In: 15. DFN-Workshop Sicherheit in Vernetzten Systemen : 13./14. Februar 2008 in Hamburg ; [Berichte ; DFN, Deutsches Forschungsnetz] (2008) Hamburg [Conference or workshop publication]

Holz, Thorsten ; Göbel, Jan Gerrit Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation. First Workshop on Hot Topics in Understanding Botnets, HotBots 07, Cambridge, Mass. April 11–13, 2007; proceedings In: HotBots’07: Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets (2007) (Cambridge, Mass.) [Conference or workshop publication]

Göbel, Jan Gerrit ; Holz, Thorsten ; Willems, Carsten Measurement and Analysis of Autonomous Spreading Malware in a University Environment. Hämmerli, Bernhard M. Lecture Notes in Computer Science 4579 109-128 In: Detection of intrusions and malware, and vulnerability assessment : 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12 - 13, 2007; proceedings (2007) Berlin [u.a.] [Conference or workshop publication]

Working paper

Göbel, Jan Gerrit ; Stock, Ben ; Trinius, Philipp ; Freiling, Felix (2010) Blacklisting Malicious Websites using Peer-to-Peer Technology. Open Access None Mannheim [Working paper]
[img]
Preview

Göbel, Jan Gerrit (2009) Amun : a python honeypot. Open Access None Mannheim [Working paper]
[img]
Preview

This list was created automatically on Sun Jun 13 05:23:44 2021 CEST