2008 |
21 | EE | Konrad Rieck,
Thorsten Holz,
Carsten Willems,
Patrick Düssel,
Pavel Laskov:
Learning and Classification of Malware Behavior.
DIMVA 2008: 108-125 |
20 | | Felix C. Freiling,
Thorsten Holz,
Martin Mink:
Reconstructing People's Lives: A Case Study in Teaching Forensic Computing.
IMF 2008: 125-142 |
19 | EE | Thorsten Holz,
Moritz Steiner,
Frederic Dahl,
Ernst Biersack,
Felix C. Freiling:
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm.
LEET 2008 |
18 | EE | Lothar Braun,
Falko Dressler,
Thorsten Holz,
Engin Kirda,
Jan Kohlrausch,
Christopher Kruegel,
Tobias Limmer,
Konrad Rieck,
James P. G. Sterbenz:
08102 Working Group -- Requirements for Network Monitoring from an IDS Perspective.
Network Attack Detection and Defense 2008 |
17 | EE | Marc Dacier,
Hervé Debar,
Thorsten Holz,
Engin Kirda,
Jan Kohlrausch,
Christopher Kruegel,
Konrad Rieck,
James P. G. Sterbenz:
8102 Working Group -- Attack Taxonomy.
Network Attack Detection and Defense 2008 |
16 | | Ali Ikinci,
Thorsten Holz,
Felix C. Freiling:
Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients.
Sicherheit 2008: 407-421 |
2007 |
15 | EE | Jan Goebel,
Thorsten Holz,
Carsten Willems:
Measurement and Analysis of Autonomous Spreading Malware in a University Environment.
DIMVA 2007: 109-128 |
14 | EE | Jianwei Zhuge,
Thorsten Holz,
Xinhui Han,
Chengyu Song,
Wei Zou:
Collecting Autonomous Spreading Malware Using High-Interaction Honeypots.
ICICS 2007: 438-451 |
2006 |
13 | | Zinaida Benenson,
Felix C. Freiling,
Thorsten Holz,
Dogan Kesdogan,
Lucia Draque Penso:
Safety, Liveness, and Information Flow: Dependability Revisited.
ARCS Workshops 2006: 56-65 |
12 | | Philip Anderson,
Maximillian Dornseif,
Felix C. Freiling,
Thorsten Holz,
Alastrair Irons,
Christopher Laing,
Martin Mink:
A Comparative Study of Teaching Forensics at a University Degree Level.
IMF 2006: 116-127 |
11 | EE | Paul Baecher,
Markus Koetter,
Thorsten Holz,
Maximillian Dornseif,
Felix C. Freiling:
The Nepenthes Platform: An Efficient Approach to Collect Malware.
RAID 2006: 165-184 |
10 | | Thorsten Holz:
Learning More About Attack Patterns With Honeypots.
Sicherheit 2006: 30-41 |
9 | EE | Thorsten Holz,
Simon Marechal,
Frédéric Raynal:
New Threats and Attacks on the World Wide Web.
IEEE Security & Privacy 4(2): 72-75 (2006) |
2005 |
8 | | Maximillian Dornseif,
Thorsten Holz,
Sven Müller:
Honeypots and Limitations of Deception.
DFN-Arbeitstagung über Kommunikationsnetze 2005: 235-252 |
7 | EE | Fabien Pouget,
Thorsten Holz:
A Pointillist Approach for Comparing Honeypots.
DIMVA 2005: 51-68 |
6 | EE | Thorsten Holz:
Security Measurements and Metrics for Networks.
Dependability Metrics 2005: 157-165 |
5 | EE | Felix C. Freiling,
Thorsten Holz,
Georg Wicherski:
Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks.
ESORICS 2005: 319-335 |
4 | EE | Thorsten Holz:
A Short Visit to the Bot Zoo.
IEEE Security & Privacy 3(3): 76-79 (2005) |
2004 |
3 | | Maximillian Dornseif,
Felix C. Gärtner,
Thorsten Holz:
Ermittlung von Verwundbarkeiten mit elektronischen Ködern.
DIMVA 2004: 129-141 |
2 | EE | Maximillian Dornseif,
Thorsten Holz,
Christian N. Klein:
NoSEBrEaK - Attacking Honeynets
CoRR cs.CR/0406052: (2004) |
1 | EE | Maximillian Dornseif,
Felix C. Gärtner,
Thorsten Holz:
Ermittlung von Verwundbarkeiten mit elektronischen Koedern
CoRR cs.CR/0406059: (2004) |