| 2008 |
| 21 | EE | Konrad Rieck,
Thorsten Holz,
Carsten Willems,
Patrick Düssel,
Pavel Laskov:
Learning and Classification of Malware Behavior.
DIMVA 2008: 108-125 |
| 20 | | Felix C. Freiling,
Thorsten Holz,
Martin Mink:
Reconstructing People's Lives: A Case Study in Teaching Forensic Computing.
IMF 2008: 125-142 |
| 19 | EE | Thorsten Holz,
Moritz Steiner,
Frederic Dahl,
Ernst Biersack,
Felix C. Freiling:
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm.
LEET 2008 |
| 18 | EE | Lothar Braun,
Falko Dressler,
Thorsten Holz,
Engin Kirda,
Jan Kohlrausch,
Christopher Kruegel,
Tobias Limmer,
Konrad Rieck,
James P. G. Sterbenz:
08102 Working Group -- Requirements for Network Monitoring from an IDS Perspective.
Network Attack Detection and Defense 2008 |
| 17 | EE | Marc Dacier,
Hervé Debar,
Thorsten Holz,
Engin Kirda,
Jan Kohlrausch,
Christopher Kruegel,
Konrad Rieck,
James P. G. Sterbenz:
8102 Working Group -- Attack Taxonomy.
Network Attack Detection and Defense 2008 |
| 16 | | Ali Ikinci,
Thorsten Holz,
Felix C. Freiling:
Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients.
Sicherheit 2008: 407-421 |
| 2007 |
| 15 | EE | Jan Goebel,
Thorsten Holz,
Carsten Willems:
Measurement and Analysis of Autonomous Spreading Malware in a University Environment.
DIMVA 2007: 109-128 |
| 14 | EE | Jianwei Zhuge,
Thorsten Holz,
Xinhui Han,
Chengyu Song,
Wei Zou:
Collecting Autonomous Spreading Malware Using High-Interaction Honeypots.
ICICS 2007: 438-451 |
| 2006 |
| 13 | | Zinaida Benenson,
Felix C. Freiling,
Thorsten Holz,
Dogan Kesdogan,
Lucia Draque Penso:
Safety, Liveness, and Information Flow: Dependability Revisited.
ARCS Workshops 2006: 56-65 |
| 12 | | Philip Anderson,
Maximillian Dornseif,
Felix C. Freiling,
Thorsten Holz,
Alastrair Irons,
Christopher Laing,
Martin Mink:
A Comparative Study of Teaching Forensics at a University Degree Level.
IMF 2006: 116-127 |
| 11 | EE | Paul Baecher,
Markus Koetter,
Thorsten Holz,
Maximillian Dornseif,
Felix C. Freiling:
The Nepenthes Platform: An Efficient Approach to Collect Malware.
RAID 2006: 165-184 |
| 10 | | Thorsten Holz:
Learning More About Attack Patterns With Honeypots.
Sicherheit 2006: 30-41 |
| 9 | EE | Thorsten Holz,
Simon Marechal,
Frédéric Raynal:
New Threats and Attacks on the World Wide Web.
IEEE Security & Privacy 4(2): 72-75 (2006) |
| 2005 |
| 8 | | Maximillian Dornseif,
Thorsten Holz,
Sven Müller:
Honeypots and Limitations of Deception.
DFN-Arbeitstagung über Kommunikationsnetze 2005: 235-252 |
| 7 | EE | Fabien Pouget,
Thorsten Holz:
A Pointillist Approach for Comparing Honeypots.
DIMVA 2005: 51-68 |
| 6 | EE | Thorsten Holz:
Security Measurements and Metrics for Networks.
Dependability Metrics 2005: 157-165 |
| 5 | EE | Felix C. Freiling,
Thorsten Holz,
Georg Wicherski:
Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks.
ESORICS 2005: 319-335 |
| 4 | EE | Thorsten Holz:
A Short Visit to the Bot Zoo.
IEEE Security & Privacy 3(3): 76-79 (2005) |
| 2004 |
| 3 | | Maximillian Dornseif,
Felix C. Gärtner,
Thorsten Holz:
Ermittlung von Verwundbarkeiten mit elektronischen Ködern.
DIMVA 2004: 129-141 |
| 2 | EE | Maximillian Dornseif,
Thorsten Holz,
Christian N. Klein:
NoSEBrEaK - Attacking Honeynets
CoRR cs.CR/0406052: (2004) |
| 1 | EE | Maximillian Dornseif,
Felix C. Gärtner,
Thorsten Holz:
Ermittlung von Verwundbarkeiten mit elektronischen Koedern
CoRR cs.CR/0406059: (2004) |