2011
Benenson, Zinaida ; Dewald, Andreas ; Eßer, Hans-Georg ; Freiling, Felix ; Müller, Thilo ; Moch, Christian ; Vömel, Stefan ; Schinzel, Sebastian ; Spreitzenbarth, Michael ; Stock, Ben ; Stüttgen, Johannes
Exploring the Landscape of Cybercrime.
69-72
In: 2011 First SysSec Workshop (SysSec 2011) : Amsterdam, Netherlands, 6 July 2011 ; [proceedings]
(2011)
Washington, DC
SysSec 2011
(Amsterdam, Netherlands)
[Konferenzveröffentlichung]
|
|
Müller, Thilo ; Freiling, Felix ; Dewald, Andreas
TRESOR Runs Encryption Securely Outside RAM.
17-32
In: Proceedings of the 20th USENIX conference on Security (SEC '11)
(2011)
Berkeley, Calif.
SEC'11
(San Francisco, Calif.)
[Konferenzveröffentlichung]
|
|
2010
Müller, Tilo ; Dewald, Andreas ; Freiling, Felix
AESSE: A cold-boot resistant implementation of AES.
42-47
In: Proceedings of the Third European Workshop on System Security, EUROSEC '10
(2010)
New York, NY [u.a.]
EUROSEC '10
(Paris, France)
[Konferenzveröffentlichung]
|
|
Holz, Thorsten ; Spreitzenbarth, Michael
Towards secure deletion on smartphones.
Freiling, Felix
GI-Edition : Lecture Notes in Informatics. Proceedings
170
165-176
In: Sicherheit 2010 : Sicherheit, Schutz und Zuverlässigkeit ; Konferenzband der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5. - 7. Oktober 2010 in Berlin
(2010)
Bonn
Sicherheit 2010
(Berlin, Germany)
[Konferenzveröffentlichung]
|
|
Göbel, Jan Gerrit ; Trinius, Philipp
Towards optimal sensor placement strategies for early warning systems.
Freiling, Felix
GI-Edition : Lecture Notes in Informatics. Proceedings
170
191-204
In: Sicherheit 2010 : Sicherheit, Schutz und Zuverlässigkeit ; Konferenzband der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5. - 7. Oktober 2010 in Berlin
(2010)
Bonn
Sicherheit 2010
(Berlin, Germany)
[Konferenzveröffentlichung]
|
|
Göbel, Jan Gerrit
Amun: automatic capturing of malicious software.
Freiling, Felix
GI-Edition : Lecture Notes in Informatics. Proceedings
170
177-190
In: Sicherheit 2010 : Sicherheit, Schutz und Zuverlässigkeit ; Konferenzband der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5. - 7. Oktober 2010 in Berlin
(2010)
Bonn
Sicherheit 2010
(Berlin, Germany)
[Konferenzveröffentlichung]
|
|
Trinius, Philipp ; Willems, Carsten ; Holz, Thorsten ; Rieck, Konrad
A malware instruction set for behavior-based analysis.
Freiling, Felix
GI-Edition : Lecture Notes in Informatics. Proceedings
170
205-216
In: Sicherheit 2010 : Sicherheit - Schutz und Zuverlässigkeit ; Konferenzband der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Berlin
(2010)
Bonn
Sicherheit 2010
(Berlin, Germany)
[Konferenzveröffentlichung]
|
|
Catrina, Octavian ; Hoogh, Sebastiaan de
Secure multiparty linear programming using fixed-point arithmetic.
Gritzalis, Dimitris
Lecture Notes in Computer Science
6345
134-150
In: Computer Security - ESORICS 2010 : 15th European Symposium on Research in Computer Security, Athens, Greece, September 20 - 22, 2010; proceedings
(2010)
Berlin [u.a.]
ESORICS 2010
(Athens, Greece)
[Konferenzveröffentlichung]
|
|
Catrina, Octavian ; Hoogh, Sebastiaan de
Improved primitives for secure multiparty integer computation.
Garay, Juan A.
Lecture Notes in Computer Science
6280
182-199
In: Security and cryptography for networks : 7th international conference, SCN 2010, Amalfi, Italy, September 13 - 15, 2010; proceedings
(2010)
Berlin [u.a.]
SCN 2010
(Amalfi, Italy)
[Konferenzveröffentlichung]
|
|
Catrina, Octavian ; Saxena, Amitabh
Secure computation with fixed-point numbers.
Sion, Radu
Lecture Notes in Computer Science
6052
35-50
In: Financial cryptography and data security : 14th International Conference, FC 2010, Tenerife, Canary Islands, Spain, January 25 - 28, 2010; revised selected papers
(2010)
Berlin [u.a.]
FC 2010
(Tenerife, Spain)
[Konferenzveröffentlichung]
|
|
2009
Freiling, Felix ; Lambertz, Christian ; Majster-Cederbaum, Mila
Modular Consensus Algorithms for the Crash-Recovery Model.
Second International Workshop on Reliability, Availability, and Security (WRAS 2009) Hiroshima, Japan, December 2009; proceedings
287-292
In: 2009 International Conference on Parallel and Distributed Computing, Applications and Technologies : PDCAT 2009 ; Higashi-Hiroshima, Japan, 8 - 11 December 2009 ; [including workshop papers]
(2009)
Washington, DC
[Konferenzveröffentlichung]
|
|
Stock, Ben ; Göbel, Jan Gerrit ; Engelberth, Markus ; Freiling, Felix ; Holz, Thorsten
Walowdac - Analysis of a Peer-to-Peer Botnet.
2009 European Conference on Computer Network Defence (EC2ND), Milano, November 9-10, 2009
13-20
In: 2009 European Conference on Computer Network Defence (EC2ND)
(2009)
New York, NY
(Milano, Italy)
[Konferenzveröffentlichung]
|
|
Trinius, Philipp ; Holz, Thorsten ; Göbel, Jan Gerrit ; Freiling, Felix
Visual Analysis of Malware Behavior (Short paper).
6th International Workshop on Visualization for Cyber Security, Atlantic City, NJ, USA, October 11, 2009
In: 6th International Workshop on Visualization for Cyber Security
(2009)
Piscataway, NJ
(Atlantic City, NJ)
[Konferenzveröffentlichung]
|
|
Böhme, Rainer ; Freiling, Felix ; Gloe, Thomas ; Kirchner, Matthias
Multimedia Forensics is not Computer Forensics.
Geradts, Zeno
Lecture Notes in Computer Science
5718
90-103
In: Computational Forensics : Third International Workshop, IWCF 2009, The Hague, The Netherlands, August 13 - 14, 2009; proceedings
(2009)
Berlin [u.a.]
[Konferenzveröffentlichung]
|
|
Göbel, Jan Gerrit ; Holz, Thorsten ; Trinius, Philipp
Towards Proactive Spam Filtering (Extended Abstract).
Flegel, Ulrich
Lecture Notes in Computer Science
5587
36-47
In: Detection of intrusions and malware, and vulnerability assessment : 6th International Conference, DIMVA 2009, Como, Italy, July 9 - 10, 2009; proceedings
(2009)
Berlin [u.a.]
[Konferenzveröffentlichung]
|
|
Badura, Thomas ; Becher, Michael
Testing the Symbian OS Platform Security Architecture.
Awan, Irfan
The IEEE 23rd International Conference on Advanced Information Networking and Applications, AINA 2009, Bradford, United Kingdom, May 26-29, 2009
838-844
In: International Conference on Advanced Information Networking and Applications, 2009 : AINA '09 ; Bradford, United Kingdom, 26 - 29 May 2009
(2009)
Piscataway, NJ
[Konferenzveröffentlichung]
|
|
Krontiris, Ioannis ; Benenson, Zinaida ; Giannetsos, Thanassis ; Freiling, Felix ; Dimitriou, Tassos
Cooperative intrusion detection in wireless sensor networks.
Rödig, Utz
Lecture Notes in Computer Science
5432
263-278
In: Wireless sensor networks : 6th European Conference, EWSN 2009, Cork, Ireland, February 11 - 13, 2009; proceedings
(2009)
Berlin [u.a.]
EWSN 2009
(Cork, Ireland)
[Konferenzveröffentlichung]
|
|
Moch, Christian ; Freiling, Felix
The Forensic Image Generator Generator (Forensig2).
Goebel, Oliver
78-93
In: Fifth International Conference on IT Security Incident Management and IT Forensics, 2009 : IMF '09 ; Stuttgart, Germany, 15 - 17 Sept. 2009
(2009)
Piscataway, NJ
[Konferenzveröffentlichung]
|
|
2008
Hund, Ralf ; Hamann, Matthias ; Holz, Thorsten
Towards Next-Generation Botnets.
Proceedings of the 4th European Conference on Computer Network Defense (EC2ND 08)
33-40
In: 2008 European Conference on Computer Network Defense : (EC2ND) ; Dublin, Ireland, 11 - 12 December 2008
(2008)
Piscataway, NJ
[Konferenzveröffentlichung]
|
|
Freiling, Felix ; Holz, Thorsten ; Mink, Martin
Reconstructing Peoples Lives: A Case Study in Teaching Forensic Computing.
Göbel, Oliver
GI-Edition : Lecture Notes in Informatics. Proceedings
140
125-142
In: IMF 2008 : IT Incident Management & IT-Forensics; proceedings of the 4th International Conference on IT Incident Management & IT-Forensics; September 23 - 25, 2008, Mannheim, Germany
(2008)
Bonn
[Konferenzveröffentlichung]
|
|
Eusgeld, Irene ; Freiling, Felix ; Reussner, Ralf
(2008)
Dependability Metrics.
Lecture Notes in Computer Science
Berlin [u.a.]
4909
[Buch]
|
|
Beek, Frank van der ; Mink, Martin
Wie lehrt man IT-Sicherheit am Besten? Eine empirische Studie.
Alkassar, Ammar
GI-Edition : Lecture Notes in Informatics. Proceedings
128
499-511
In: Sicherheit 2008 : Sicherheit - Schutz und Zuverlässigkeit ; Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) ... ; 2. - 4. April 2008 im Saarbrücker Schloss
(2008)
Bonn
[Konferenzveröffentlichung]
|
|
Freiling, Felix ; Becher, Michael
Towards Dynamic Malware Analysis to Increase Mobile Device Security.
Alkassar, Ammar
GI-Edition : Lecture Notes in Informatics. Proceedings
128
423-433
In: Sicherheit 2008 : Sicherheit - Schutz und Zuverlässigkeit ; Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) ... ; 2. - 4. April 2008 im Saarbrücker Schloss
(2008)
Bonn
[Konferenzveröffentlichung]
|
|
Ikinci, Ali ; Holz, Thorsten ; Freiling, Felix
Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients.
Alkassar, Ammar
GI-Edition : Lecture Notes in Informatics. Proceedings
128
407-421
In: Sicherheit 2008 : Sicherheit - Schutz und Zuverlässigkeit ; Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) ... ; 2. - 4. April 2008 im Saarbrücker Schloss
(2008)
Bonn
[Konferenzveröffentlichung]
|
|
Göbel, Jan Gerrit ; Holz, Thorsten
Rishi: Identifizierung von Bots durch Auswerten der IRC Nicknamen.
Paulsen, Christian
Sicherheit in vernetzten Systemen : 15. DFN Workshop
D 1-16
In: 15. DFN-Workshop Sicherheit in Vernetzten Systemen : 13./14. Februar 2008 in Hamburg ; [Berichte ; DFN, Deutsches Forschungsnetz]
(2008)
Hamburg
[Konferenzveröffentlichung]
|
|
Holz, Thorsten ; Gorecki, Christian ; Rieck, Konrad ; Freiling, Felix
Measuring and Detecting Fast-Flux Service Networks.
Proceedings of the Network and Distributed System Security Symposium, NDSS 2008, San Diego, California, USA, 10th-13th February 2008
257-268
In: Proceedings / 2008 Network and Distributed System Security Symposium : February 10 - 13, 2008, San Diego, California
(2008)
Reston, Va.
[Konferenzveröffentlichung]
|
|
Gorecki, Christian
Truman Box - Transparente Emulation von Internetdiensten.
Paulsen, Christian
Sicherheit in vernetzten Systemen: 15. DFN Workshop
E [1-19]
In: 15. DFN-Workshop Sicherheit in Vernetzten Systemen : 13./14. Februar 2008 in Hamburg ; [Berichte ; DFN, Deutsches Forschungsnetz]
(2008)
Hamburg
[Konferenzveröffentlichung]
|
|
2007
Benenson, Zinaida
(2007)
Lower Bounds.
Wagner, Dorothea
Algorithms for Sensor and Ad Hoc Networks
Lecture Notes in Computer Science
Berlin [u.a.]
4621
117-130
[Buchkapitel]
|
|
Benenson, Zinaida ; Freiling, Felix ; Cholewinski, Peter M.
Advanced Evasive Data Storage in Sensor Networks.
8th International Conference on Mobile Data Management : MDM '07, Mannheim, Germany, May 7-11, 2007 ; proceedings
146-151
In: Proceedings / 2007 International Conference on Mobile Data Management : MDM 2007, May 7 - 11, 2007, Mannheim, Germany
(2007)
Piscataway, NJ [u.a.]
[Konferenzveröffentlichung]
|
|
Zhuge, Jianwei ; Holz, Thorsten ; Han, Xinhui ; Song, Chengyu ; Zou, Wei
Collecting Autonomous Spreading Malware Using High-Interaction Honeypots.
Qing, Sihan
Lecture Notes in Computer Science
4861
438-451
In: Information and communications security : 9th International Conference, ICICS 2007, Zhengzhou, China, December 12 - 15, 2007; proceedings
(2007)
Berlin [u.a.]
[Konferenzveröffentlichung]
|
|
Biely, Martin ; Hutle, Martin ; Draque Penso, Lucia ; Widder, Josef
Relating Stabilizing Timing Assumptions to Stabilizing Failure Detectors Regarding Solvability and Efficiency.
Masuzawa, Toshimitsu
Lecture Notes in Computer Science
4838
4-20
In: Stabilization, safety, and security of distributed systems : 9th International Symposium, SSS 2007, Paris, France, November 14 - 16, 2007; proceedings
(2007)
Berlin [u.a.]
[Konferenzveröffentlichung]
|
|
Freiling, Felix ; Jhumka, Arshad
Global Predicate Detection in Distributed Systems with Small Faults.
Masuzawa, Toshimitsu
Lecture Notes in Computer Science
4838
296-310
In: Stabilization, safety, and security of distributed systems : 9th International Symposium, SSS 2007, Paris, France, November 14 - 16, 2007; proceedings
(2007)
Berlin [u.a.]
[Konferenzveröffentlichung]
|
|
Freiling, Felix ; Schwittay, Bastian
Towards Reliable Rootkit Detection in Live Response.
Frings, Sandra
GI-Edition : Lecture Notes in Informatics. Proceedings
114
125-144
In: IMF 2007 : IT-Incident Management and IT-Forensics; proceedings of the 3rd International Conference on IT-Incident Management &IT-Forensics; September 11 -13, 2007, Stuttgart, Germany
(2007)
Bonn
[Konferenzveröffentlichung]
|
|
Freiling, Felix ; Dornseif, Maximillian ; Daiya, Harish
Testing Forensic Hash Tools on Sparse Files.
IMF 2007 : IT-Incident Management and IT-Forensics; proceedings of the 3rd International Conference on IT-Incident Management &IT-Forensics ; September 11 -13, 2007, Stuttgart, Germany
In: IMF 2007 : IT-Incident Management and IT-Forensics; proceedings of the 3rd International Conference on IT-Incident Management &IT-Forensics ; September 11 -13, 2007, Stuttgart, Germany
(2007)
Bonn
[Konferenzveröffentlichung]
|
|
Freiling, Felix ; Schwittay, Bastian
A Common Process Model for Incident Response and Computer Forensics.
Frings, Sandra
GI-Edition : Lecture Notes in Informatics. Proceedings
114
19-40
In: IMF 2007 : IT-Incident Management and IT-Forensics; proceedings of the 3rd International Conference on IT-Incident Management &IT-Forensics; September 11 -13, 2007, Stuttgart, Germany
(2007)
Bonn
[Konferenzveröffentlichung]
|
|
Freiling, Felix ; Majuntke, Matthias ; Mittal, Neeraj
On Detecting Termination in the Crash-Recovery Model.
Euro-Par 2007, parallel processing : 13th International Euro-Par Conference, Rennes, France, August 28 - 31, 2007; proceedings
In: Euro-Par 2007, parallel processing : 13th International Euro-Par Conference, Rennes, France, August 28 - 31, 2007; proceedings
(2007)
Berlin [u.a.]
[Konferenzveröffentlichung]
|
|
Göbel, Jan Gerrit ; Holz, Thorsten ; Willems, Carsten
Measurement and Analysis of Autonomous Spreading Malware in a University Environment.
Hämmerli, Bernhard M.
Lecture Notes in Computer Science
4579
109-128
In: Detection of intrusions and malware, and vulnerability assessment : 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12 - 13, 2007; proceedings
(2007)
Berlin [u.a.]
[Konferenzveröffentlichung]
|
|
Krontiris, Ioannis ; Dimitriou, Tassos ; Freiling, Felix
Towards an Intrusion Detection System in Wireless Sensor Networks.
13th European Wireless Conference, 1-4th April, Paris, France; proceedings
1-7
In: European Wireless 2007 : 13th European Wireless Conference ; Paris, April 1-4, 2007 ; proceedings
(2007)
Paris
[Konferenzveröffentlichung]
|
|
Holz, Thorsten ; Göbel, Jan Gerrit
Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation.
First Workshop on Hot Topics in Understanding Botnets, HotBots 07, Cambridge, Mass. April 11–13, 2007; proceedings
In: HotBots’07: Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets
(2007)
(Cambridge, Mass.)
[Konferenzveröffentlichung]
|
|
Cortiñas, Roberto ; Freiling, Felix ; Ghajar-Azadanlou, Marjan ; Lafuente, Alberto ; Larrea, Mikel ; Draque Penso, Lucia ; Soraluze, Iratxe
Secure failure detection in TrustedPals.
Masuzawa, Toshimitsu
Lecture Notes in Computer Science
4838
173-188
In: Stabilization, safety, and security of distributed systems : 9th International Symposium, SSS 2007, Paris, France, November 14 - 16, 2007; proceedings
(2007)
Berlin [u.a.]
Symposium on Self-Stabilizing Systems 2007
(Paris, France)
[Konferenzveröffentlichung]
|
|
Delporte-Gallet, Carole ; Fauconnier, Hugues ; Freiling, Felix ; Draque Penso, Lucia ; Tielmann, Andreas
From Crash-Stop to Permanent Omission: Automatic Transformations and Weakest Failure Detectors.
Pelc, Andrzej
Lecture Notes in Computer Science
4731
165-178
In: Distributed computing : 21st International Symposium, DISC 2007, Lemesos, Cyprus, September 24 - 26, 2007; proceedings
(2007)
Berlin [u.a.]
[Konferenzveröffentlichung]
|
|
2006
Holz, Thorsten
Learning More About Attack Patterns With Honeypots.
GI-Edition : Lecture Notes in Informatics. Proceedings
77
30-41
In: Sicherheit 2006 : Konferenzband der 3. Jahrestagung [des] Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI); Otto-von-Guericke-Universität Magdeburg, 20. - 22. Februar
(2006)
Bonn
[Konferenzveröffentlichung]
|
|
Holz, Thorsten ; Wicherski, Georg
Effektives Sammeln von Malware mit Honeypots.
Paulsen, Christian
13. Workshop Sicherheit in vernetzten Systemen : 1./2. März 2006 in Hamburg; [Berichte; DFN, Deutsches Forschungsnetz] / DFN CERT
G
In: 13. Workshop Sicherheit in vernetzten Systemen : 1./2. März 2006 in Hamburg; [Berichte; DFN, Deutsches Forschungsnetz]
(2006)
Hamburg
[Konferenzveröffentlichung]
|
|
Holz, Thorsten
Learning More About Attack Patterns With Honeypots.
Dittmann, Jana
GI-Edition : Lecture Notes in Informatics. Proceedings
77
30-41
In: Sicherheit 2006 : Konferenzband der 3. Jahrestagung [des] Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI); Otto-von-Guericke-Universität Magdeburg, 20. - 22. Februar 2006
(2006)
Bonn
[Konferenzveröffentlichung]
|
|
Nasserian, Samad ; Tsudik, Gene
Revisiting Oblivious Signature-Based Envelopes : New Constructs and Properties.
Di Crescenzo, Giovanni
Lecture Notes in Computer Science
4107
221-235
In: Financial Cryptography and Data Security : 10th International Conference, FC 2006, Anguilla, British West Indies, February 27 - March 2, 2006; revised selected papers
(2006)
Berlin [u.a.]
FC 2006
(Anguilla, British West Indies)
[Konferenzveröffentlichung]
|
|
Becher, Alexander ; Benenson, Zinaida ; Dornseif, Maximillian
Tampering with Motes : Real-World Attacks on Wireless Sensor Networks.
In: Sicherheit 2006 : Haupttagung "Sicherheit - Schutz und Zuverlässigkeit"; Konferenzband der 3. Jahrestagung [des] Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI); Otto-von-Guericke-Universität Magdeburg, 20. - 22. Februar 2006
(2006)
Bonn
[Konferenzveröffentlichung]
|
|
Achtzehn, Andreas ; Benenson, Zinaida ; Rohner, Christian
Implementing Agreement Protocols in Sensor Networks.
Proceedings / 2nd IEEE International Workshop on Wireless and Sensor Networks Security, WSNS'06, October 9 -12, 2006, Vancouver, Canada
858-863
In: 2006 IEEE International Conference on Mobile Ad-hoc and Sensor Systems : [Vancouver, B.C, Canada], 9-12 Oct. 2006; proceedings
(2006)
Piscataway, NJ
[Konferenzveröffentlichung]
|
|
Benenson, Zinaida ; Freiling, Felix ; Pfitzmann, Birgit ; Rohner, Christian ; Waidner, Michael
Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks.
Buttyán, Levente
Lecture Notes in Computer Science
4357
165-178
In: Security and privacy in ad-hoc and sensor networks : Third European Workshop, ESAS 2006, Hamburg, Germany, September 20 - 21, 2006; revised selected papers
(2006)
Berlin [u.a.]
[Konferenzveröffentlichung]
|
|
Freiling, Felix ; Mittal, Neeraj ; Phaneesh, Kuppahalli L.
Safe Termination Detection in an Asynchronous Distributed System When Processes May Crash and Recover.
Principles of Distributed Systems 10th International Conference, OPODIS 2006, Bordeaux, France, December 12 - 15, 2006; proceedings
126-141
In: Principles of Distributed Systems 10th International Conference, OPODIS 2006, Bordeaux, France, December 12 - 15, 2006; proceedings
(2006)
Berlin [u.a.]
[Konferenzveröffentlichung]
|
|
Anderson, Philip ; Dornseif, Maximillian ; Freiling, Felix ; Holz, Thorsten ; Irons, Alastair ; Laing, Christopher ; Mink, Martin
A Comparative Study of Teaching Forensics at a University Degree Level.
Göbel, Oliver
GI-Edition : Lecture Notes in Informatics. Proceedings
97
116-127
In: IMF 2006 : IT-Incident Management and IT-Forensics; conference proceedings; October 18th-19th, 2006, Stuttgart, Germany
(2006)
Bonn
[Konferenzveröffentlichung]
|
|
Mink, Martin ; Freiling, Felix
Is Attack Better Than Defense? Teaching Information Security the Right Way.
3rd annual Conference on Information Security Curriculum Development, Conference on Information Security Curriculum Development 2006; proceedings
44-48
In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development : InfoSecCD '06 ; September 22 - 23, 2006, Kennesaw, Georgia, USA
(2006)
New York, NY [u.a.]
[Konferenzveröffentlichung]
|
|
Baecher, Paul ; Koetter, Markus ; Holz, Thorsten ; Dornseif, Maximillian ; Freiling, Felix
The Nepenthes Platform: An Efficient Approach to Collect Malware.
Zamboni, Diego
Lecture Notes in Computer Science
4219
165-184
In: Recent advances in intrusion detection : 9th International Symposium, RAID 2006, Hamburg, Germany, September 20 - 22, 2006; proceedings
(2006)
Berlin [u.a.]
[Konferenzveröffentlichung]
|
|
Fort, Milan ; Freiling, Felix ; Draque Penso, Lucia ; Benenson, Zinaida ; Kesdogan, Dogan
TrustedPals: Secure Multiparty Computation Implemented with Smart Cards.
Gollmann, Dieter
Lecture Notes in Computer Science
4189
34-48
In: Computer security - ESORICS 2006 : 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18 - 20, 2006; proceedings
(2006)
Berlin [u.a.]
[Konferenzveröffentlichung]
|
|
Böhme, Rainer ; Holz, Thorsten
The Effect of Stock Spam on Financial Markets.
5th Workshop on the Economics of Information Security, WEIS 2006, Robinson College, Univ. of Cambridge, England, 26-28 June 2006; proceedings
1-24
In: 5th Annual Workshop on the Economics of Information Security, WEIS 2006, Robinson College, University of Cambridge, England, UK, June 26-28, 2006
(2006)
Cambridge
[Konferenzveröffentlichung]
|
|
Dornseif, Maximillian ; Freiling, Felix ; Gedicke, Nils ; Holz, Thorsten
Design and Implementation of the Honey-DVD.
7th Annual IEEE Information Assurance Workshop, 21-23 June 2006, United States Military Academy, West Point, New York
231-238
In: 7th Annual IEEE Information Assurance Workshop : 21-23 June 2006, United States Military Academy, West Point, New York : the West Point Workshop
(2006)
Piscataway, NJ
[Konferenzveröffentlichung]
|
|
Benenson, Zinaida ; Freiling, Felix ; Hammerschmidt, Ernest ; Lucks, Stefan ; Pimenidis, Lexi
Authenticated Query Flooding in Sensor Networks.
Security and privacy in dynamic environments : proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden
In: Security and privacy in dynamic environments : proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden
(2006)
New York, NY [u.a.]
[Konferenzveröffentlichung]
|
|
Dornseif, Maximillian ; Benenson, Zinaida ; Becher, Michael ; Lucks, Stefan ; Hammerschmidt, Ernest ; Pimenidis, Lexi
Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks.
Security in pervasive computing : Third International Conference, SPC 2006, York, UK, April 18 - 21, 2006; proceedings
In: Security in pervasive computing : Third International Conference, SPC 2006, York, UK, April 18 - 21, 2006; proceedings
(2006)
Berlin [u.a.]
[Konferenzveröffentlichung]
|
|
Benenson, Zinaida ; Draque Penso, Lucia ; Freiling, Felix ; Holz, Thorsten ; Kesdogan, Dogan
Safety, Liveness, and Information Flow: Dependability Revisited.
ARCS'06 : 19th International Conference on Architecture of Computing Systems; Workshop proceedings; March 16, 2006, Frankfurt am Main
In: ARCS'06 : 19th International Conference on Architecture of Computing Systems; Workshop proceedings; March 16, 2006, Frankfurt am Main
(2006)
Bonn
[Konferenzveröffentlichung]
|
|
Warns, Timo ; Freiling, Felix ; Hasselbring, Wilhelm
Solving consensus using structural failure models.
Proceedings / 25th Symposium on Reliable Distributed Systems, SRDS 2006, 2-4 October 2006, Leeds, UK
212-224
In: Proceedings - 25th IEEE Symposium on Reliable Distributed Systems, SRDS 2006 : 2 - 4 October 2006, Leeds, United Kingdom
(2006)
Los Alamitos, Calif. [u.a.]
[Konferenzveröffentlichung]
|
|
Freiling, Felix ; Jhumka, Arshad ; Fetzer, Christof ; Suri, Neeraj
(2006)
An approach to synthesize safe systems.
International Journal of Security and Networks : IJSN
Genève
62-74
[Zeitschriftenartikel]
|
|
2005
Pouget, Fabien ; Holz, Thorsten
A Pointillist Approach for Comparing Honeypots.
Julisch, Klaus
Lecture Notes in Computer Science
3548
51-68
In: Detection of Intrusions and Malware and Vulnerability Assessment : Second International Conference, DIMVA 2005, Vienna, Austria; proceedings
(2005)
Berlin [u.a.]
[Konferenzveröffentlichung]
|
|
Holz, Thorsten
(2005)
A Short Visit to the Bot Zoo.
IEEE Security & Privacy : Building Confidence in a Networked World / IEEE Computer Society, Institute of Electrical and Electronics Engineers
New York, NY
3
3
76-79
[Zeitschriftenartikel]
|
|
Benenson, Zinaida ; Freiling, Felix ; Kesdogan, Dogan
An Algorithmic Framework of Robust Access Control in Wireless Sensor Networks.
Cayirci, Erda
EWSN 2005 CFP : 2nd European Workshop on Wireless SensorNetworks, Istanbul, Turkey, January 31 - February 2, 2005
158-165
In: Proceedings on the Second European Workshop on Wireless Sensor Networks, Istanbul, Turkey
(2005)
Piscataway, NJ
EWSN 2005 CFP
[Konferenzveröffentlichung]
|
|
Holz, Thorsten ; Raynal, Frederic
Detecting Honeypots and Other Suspicious Environments.
Proceedings / The 6th IEEE Information Assurance Workshop, 15-17 June 2005, United States Military Academy, Westpoint, New York
29-36
In: Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics (SMC) Information Assurance Workshop : West Point, New York ; workshop papers
(2005)
Piscataway, NJ
[Konferenzveröffentlichung]
|
|
Benenson, Zinaida ; Freiling, Felix ; Kesdogan, Dogan
Secure Multi-Party Computation with Security Modules.
Federrath, Hannes
GI-Edition : Lecture Notes in Informatics. Proceedings
62
41-52
In: Sicherheit 2005 : Beiträge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI); 5. - 8. April 2005 in Regensburg
(2005)
Bonn
[Konferenzveröffentlichung]
|
|
Holz, Thorsten ; Freiling, Felix ; Dornseif, Maximillian
(2005)
Vulnerability Assessment using Honepots.
Praxis der Informationsverarbeitung und Kommunikation : PIK
München
4
27
195-201
[Zeitschriftenartikel]
|
|
Freiling, Felix ; Delporte-Gallet, Carole ; Fauconnier, Hugues
Revisiting Failure Detection and Consensus in Omission Failure Environments.
Theoretical aspects of computing - ICTAC 2005 : Second International Colloquium, Hanoi, Vietnam, October 17 - 21, 2005; proceedings
394-408
In: Theoretical aspects of computing - ICTAC 2005 : Second International Colloquium; proceedings
(2005)
Berlin [u.a.]
(Hanoi, Vietnam)
[Konferenzveröffentlichung]
|
|
Avoine, Gildas ; Freiling, Felix ; Guerraoui, Rachid ; Vukolic, Marko
Gracefully Degrading Fair Exchange with Security Modules.
Dal Cin, Mario
Lecture Notes in Computer Science
3463
55-71
In: Dependable computing - EDCC 2005 : 5th European Dependable Computing Conference, Budapest, Hungary, April 20 - 22, 2005; proceedings
(2005)
Berlin [u.a.]
[Konferenzveröffentlichung]
|
|
Holz, Thorsten ; Dornseif, Maximillian
On the limits of deception.
Heute schon das Morgen sehen : 9. DFN-Arbeitstagung über Kommunikationsnetze in Düsseldorf
235-252
In: Heute schon das Morgen sehen : 9. DFN-Arbeitstagung über Kommunikationsnetze in Düsseldorf
(2005)
Bonn
[Konferenzveröffentlichung]
|
|
Mink, Martin ; Freiling, Felix ; Dornseif, Maximillian ; Pimenidis, Lexi
Teaching Data Security at University Degree Level.
Miloslavskaya, Natalia
Proceedings of the IFIP TC11 WG11.3 Fourth World Conference on Information Security Education, Fourth World Conference on Information Security Education (WISE4)
213-222
In: Success through information security knowledge : proceedings of the IFIP TC11 WG 11.8 Fourth World Conference Information Security Education, (WISE4), 18-20 May 2005, Moscow, Russia
(2005)
Moscow
[Konferenzveröffentlichung]
|
|
Freiling, Felix ; Herlihy, Maurice ; Draque Penso, Lucia
Optimal Randomized Fair Exchange with Secret Shared Coins.
Anderson, James H.
Lecture Notes in Computer Science
3974
61-72
In: Principles of distributed systems : 9th International Conference, OPODIS 2005, Pisa, Italy, December 12 - 14, 2005; revised selected paper
(2005)
Berlin [u.a.]
[Konferenzveröffentlichung]
|
|
Holz, Thorsten
(2005)
A Short Visit to the Bot Zoo.
IEEE Security & Privacy : Building Confidence in a Networked World / IEEE Computer Society, Institute of Electrical and Electronics Engineers
New York, NY
3
3
76-79
[Zeitschriftenartikel]
|
|
Benenson, Zinaida ; Gedicke, Nils ; Raivio, Ossi
Realizing Robust User Authentication in Sensor Networks.
Technical report / Swedish Institute of Computer Science
2005,9
In: Proceedings of the First REALWSN 2005 Workshop on Real-World Wireless Sensor Networks : Stockholm, Sweden, 20 - 21 June 2005
(2005)
Stockholm
[Konferenzveröffentlichung]
|
|
Benenson, Zinaida
Authenticated Queries in Sensor Networks.
Security and privacy in ad-hoc and sensor networks : Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13 - 14, 2005; revised selected papers
In: Security and privacy in ad-hoc and sensor networks : Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13 - 14, 2005; revised selected papers
(2005)
Berlin [u.a.]
[Konferenzveröffentlichung]
|
|
Freiling, Felix ; Ghosh, Sukumar
Code Stabilization.
Herman, Ted
Lecture Notes in Computer Science
3764
128-139
In: Self-stabilizing systems : 7th International Symposium, SSS 2005, Barcelona, Spain, October 26 - 27, 2005; proceedings
(2005)
Berlin [u.a.]
[Konferenzveröffentlichung]
|
|
Benenson, Zinaida ; Cholewinski, Peter M. ; Freiling, Felix
Simple Evasive Data Storage in Sensor Networks.
Zheng, Si-Qing
First International Workshop on Distributed Algorithms and Applications for Wireless and Mobile Systems, DAAWMS 2005, November 2005, Phoenix, Arizona ; proceedings
779-784
In: Proceedings of the 17th IASTED International Conference on Parallel and Distributed Computing and Systems : November 14 - 16, 2005, Phoenix, AZ, USA
(2005)
Anaheim, Calif. [u.a.]
[Konferenzveröffentlichung]
|
|
2004
Bornhövd, Christof ; Buchmann, Alejandro ; Cilia, Mariano ; Fiege, Ludger ; Freiling, Felix ; Liebig, Christoph ; Meixner, Matthias ; Mühl, Gero
(2004)
DREAM : Distributed Reliable Event-Based Application Management.
Levene, Mark
Web Dynamics : Adapting to Change in Content, Size, Topology and Use
Berlin [u.a.]
319-349
[Buchkapitel]
|
|
Holz, Thorsten ; Freiling, Felix ; Dornseif, Maximillian
Ermittlung von Verwundbarkeiten mit elektronischen Ködern.
Detection of intrusions and malware & vulnerability assessment : GI Special Interest Group SIDAR Workshop, DIMVA 2004, Dortmund, Germany, July 6 - 7, 2004
129-141
In: Detection of intrusions and malware & vulnerability assessment : GI Special Interest Group SIDAR Workshop, DIMVA 2004, Dortmund, Germany, July 6 - 7, 2004
(2004)
Bonn
[Konferenzveröffentlichung]
|
|
Vukolic, Marko ; Guerraoui, Rachid ; Freiling, Felix ; Avoine, Gildas
Modern Security with Traditional Distributed Algorithms.
Proceedings of the Workshop in Secure Multiparty Protocols : SMP 2004 ; 7-8 October 2004
1-4
In: Workshop on Secure Multiparty Protocols : SMP 2004 ; 7-8 October 2004; Amsterdam, The Netherlands
(2004)
Zurich
[Konferenzveröffentlichung]
|
|
Klein, Christian ; Holz, Thorsten ; Dornseif, Maximillian
NoSEBrEaK - Attacking Honeynets.
Proceedings of the 5th Annual IEEE Information Assurance Workshop, Westpoint, 10.-11. June 2004
In: Proceedings of the 5th Annual IEEE Information Assurance Workshop, Westpoint, 10.-11. June 2004
(2004)
West Point, NY
[Konferenzveröffentlichung]
|
|
Kursawe, Klaus ; Guerraoui, Rachid ; Freiling, Felix ; Avoine, Gildas ; Vaudenay, Serge ; Vukolic, Marko
(2004)
Reducing Fair Exchange to Atomic Commit.
Technical report / Ecole Polytechnique Fédérale, Swiss Federal Institute of Technology (EPFL)
Lausanne
11
[Arbeitspapier]
|
|
Benenson, Zinaida ; Freiling, Felix ; Kesdogan, Dogan
User authentication in sensor networks (extended abstract).
Dadam, Peter
GI-Edition : Lecture Notes in Informatics. Proceedings
51
385-389
In: Informatik 2004 : 34. Jahrestagung der Gesellschaft für Informatik; 2: Informatik verbindet; Workshop on Sensor Networks
(2004)
Bonn
[Konferenzveröffentlichung]
|
|
2003
Schiele, Robert
Building and Using a Cross Development Tool Chain.
Proceedings of the GCC Developers Summit 2003, GCC Summit, Ottawa, 24.-27.05.2003
213-222
In: Proceedings of the GCC Developers Summit 2003, GCC Summit, Ottawa, 24.-27.05.2003
(2003)
Ottawa, Ont.
[Konferenzveröffentlichung]
|
|
Fiege, Ludger ; Mühl, Gero ; Freiling, Felix
(2003)
Modular event-based systems.
Knowledge Engineering Review
Cambridge
17
4
55-85
[Zeitschriftenartikel]
|
|
2002
Mühl, Gero ; Fiege, Ludger ; Freiling, Felix ; Buchmann, Alejandro
Evaluating Advanced Routing Algorithms for Content-Based Publish/Subscribe Systems.
Boukerche, A.
The Tenth IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems
167-176
In: Proceedings of the 10th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems : MASCOTS '02
(2002)
New York, NY [u.a.]
[Konferenzveröffentlichung]
|
|
Pagnia, Henning ; Vogt, Holger ; Freiling, Felix
(2002)
Fairer Austausch im Mobile Business.
Reichwald, Ralf
Mobile Kommunikation : Wertschöpfung, Technologien, neue Dienste
Wiesbaden
157-170
[Buchkapitel]
|
|
Freiling, Felix
Fehlermodellierung ohne explizite Fehlerzustände.
Brinkschulte, Uwe
International Conference on Architecture of Computing Systems - ARCS 2002
71-80
In: Trends in network and pervasive computing ; workshop proceedings / International Conference on Architecture of Computing Systems, ARCS 2002, Karlsruhe, Germany, April 8 - 12, 2002
(2002)
Berlin
[Konferenzveröffentlichung]
|
|
Jhumka, Arshad ; Freiling, Felix ; Fetzer, Christof ; Suri, Neeraj
(2002)
On Systematic Design of Fast and Perfect Detectors.
Technical Report / Swiss Federal Institute of Technology (EPFL), School of Computer and Communication Sciences
Lausanne
200263
[Arbeitspapier]
|
|
2001
Fiege, Ludger ; Mühl, Gero ; Freiling, Felix
A Modular Approach to Build Structured Event-based Systems.
Lamont, Gary
Proceedings of the 2002 ACM Symposium on Applied Computing
385-392
In: Applied computing 2002 : proceedings of the 2002 ACM Symposium on Applied Computing ; Universidad Carlos III De Madrid, Madrid, Spain, March 11 - 14, 2002
(2001)
New York, NY
[Konferenzveröffentlichung]
|
|
2000
Kloppenburg, Sven ; Freiling, Felix
Consistent Detection of Global Predicates Under a Weak Fault Assumption.
Proceedings of the 19th IEEE Symposium on Reliable Distributed Systems
94-103
In: Proceedings / the 19th IEEE Symposium on Reliable Distributed Systems : Nürnberg, Germany, October 16 - 18, 2000
(2000)
Los Alamitos, Calif. [u.a.]
[Konferenzveröffentlichung]
|
|
Freiling, Felix
Formale Grundlagen der Fehlertoleranz.
Informatiktage 1999
137-139
In: Informatiktage 1999 : fachwissenschaftlicher Informatik-Kongreß, 12. und 13. November 1999 im Neuen Kloster Bad Schussenried
(2000)
Leinfelden-Echterdingen
Informatiktage 1999
(Bad Schussenried, Germany)
[Konferenzveröffentlichung]
|
|
1999
Theel, Oliver ; Freiling, Felix
An Exercise in Proving Convergence through Transfer Functions.
Arora, Anish
Proceedings of the IEEE Workshop on Self-Stabilizing Systems
41-47
In: Workshop on Self-Stabilizing Systems : proceedings / 19th International Conference on Distributed Computing Systems : May 31 - June 4, 1999, Austin, Texas
(1999)
Los Alamitos, Calif. [u.a.]
[Konferenzveröffentlichung]
|
|
Freiling, Felix
An exercise in systematically deriving fault-tolerance specifications.
Proceedings of the Third European Research Seminar on Advances in Distributed Systems
99-102
In: Proceedings of the Third ERSADS '99 : European Research Seminar on Advances in Distributed Systems Spring School and Workshop Madeira Island - Portugal. 23-28 April 1999
(1999)
[Lisboa]
[Konferenzveröffentlichung]
|
|
Freiling, Felix ; Pagnia, Henning
Self-stabilizing Load Distribution for Replicated Servers on a Per-Access Basis.
Arora, Anish
Proceedings of the IEEE Workshop on Self-Stabilizing Systems
102-109
In: Workshop on Self-Stabilizing Systems : proceedings / 19th International Conference on Distributed Computing Systems : May 31 - June 4, 1999, Austin, Texas
(1999)
Los Alamitos, Calif. [u.a.]
[Konferenzveröffentlichung]
|
|
1998
Stetter, Franz
Trends in der Informationstechnologie.
Veröffentlichungen des Instituts für Mittelstandsforschung. Grüne Reihe
37
56-61
In: Neue Informations- und Kommunikationstechniken in KMU : am 26. November 1998
(1998)
Mannheim
[Konferenzveröffentlichung]
|
|
Theel, Oliver ; Freiling, Felix
Exploiting Control Theory for Proving the Stability of Distributed Algorithms.
Proceedings of the 28th Annual International Symposium on Fault-Tolerant Computing
62
In: Digest of papers / Twenty-Eighth Annual International Symposium on Fault Tolerant Computing : June 23 - 27, 1998, Munich, Germany
(1998)
Los Alamitos, Calif. [u.a.]
[Konferenzveröffentlichung]
|
|
Theel, Oliver ; Freiling, Felix
On proving the stability of distributed algorithms: self-stabilization vs. control theory.
Bajic, Vladimir B.
Proceedings of the International Systems, Signals, Control, Computers Conference, (SSCC'98), Durban, South Africa
3
58-66
In: Proceedings of the International Conference on Systems, Signals, Control, Computers (SSCC'98)
(1998)
Durban
[Konferenzveröffentlichung]
|
|
Freiling, Felix
(1998)
The PretzelBook.
TU Darmstadt, Fachgebiet Systemprogrammierung
Darmstadt
[Arbeitspapier]
|
|
Diese Liste wurde am Sat Dec 21 04:03:04 2024 CET automatisch erstellt.
|