Veröffentlichungen

Design and Implementation of the Honey-DVD

2006 - Maximillian Dornseif, Felix Freiling, Nils Gedicke, Thorsten Holz

IEEE In­for­ma­ti­on As­suran­ce Work­shop (IAW), West Point, NY, June 2006 [pdf]

Design and Implementation of a Secure Linux Device Encryption Architecture

2006 - Ahmad-Reza Sadeghi, Marcel Winandy, Christian Stüble, Michael Scheibel

LinuxTag 2006. [pdf]

Safety, Liveness, and Information Flow: Dependability Revisited

2006 - Zinaida Benenson, Felix Freiling, Thorsten Holz, Dogan Kesdogan, Lucia Draque Penso

ARCS Workshop on Dependability and Fault-Tolerance, Frankfurt am Main, Germany, March 2006 [pdf]

Effektives Sammeln von Malware mit Honeypots

2006 - Thorsten Holz, Georg Wicherski

DFN-CERT Workshop "Sicherheit in vernetzten Systemen", Hamburg, March 2006 [pdf]

New Threats and Attacks on the World Wide Web

2006 - Thorsten Holz, Simon Marechal, Frédéric Raynal

IEEE Security & Privacy Volume 4, Issue 2, Pages 72-75, March 2006 [pdf]

Learning More About Attack Patterns With Honeypots

2006 - Thorsten Holz

GI Sicherheit - Schutz und Zuverlässigkeit, Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik, Magdeburg, February 2006 [pdf]

Spying With Bots

2005 - Thorsten Holz

USENIX ;login:, Volume 30, Issue 6, Pages 18-23, December 2005 [Link] [pdf]

Security Measurements and Metrics for Networks

2005 - Thorsten Holz

Dependability Metrics (Lecture Notes in Computer Science 4909, Advanced Lectures), pages 157-165, 2005 [Link]

Multilateral Security Considerations for Adaptive Mobile Applications

2005 - Adrian Spalka, Armin B. Cremers, Marcel Winandy

Proceedings of the 2nd International Conference on E-Business and Telecommunication Networks (ICETE 2005), pp. 133-137, INSTICC, 2005.

Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks

2005 - Felix Freiling, Thorsten Holz, Georg Wicherski

European Symposium on Research in Computer Security (ESORICS), Milan, Italy, September 2005 [pdf]
Seite: