2008 | ||
---|---|---|
21 | EE | Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Düssel, Pavel Laskov: Learning and Classification of Malware Behavior. DIMVA 2008: 108-125 |
20 | Felix C. Freiling, Thorsten Holz, Martin Mink: Reconstructing People's Lives: A Case Study in Teaching Forensic Computing. IMF 2008: 125-142 | |
19 | EE | Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix C. Freiling: Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. LEET 2008 |
18 | EE | Lothar Braun, Falko Dressler, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Tobias Limmer, Konrad Rieck, James P. G. Sterbenz: 08102 Working Group -- Requirements for Network Monitoring from an IDS Perspective. Network Attack Detection and Defense 2008 |
17 | EE | Marc Dacier, Hervé Debar, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Konrad Rieck, James P. G. Sterbenz: 8102 Working Group -- Attack Taxonomy. Network Attack Detection and Defense 2008 |
16 | Ali Ikinci, Thorsten Holz, Felix C. Freiling: Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients. Sicherheit 2008: 407-421 | |
2007 | ||
15 | EE | Jan Goebel, Thorsten Holz, Carsten Willems: Measurement and Analysis of Autonomous Spreading Malware in a University Environment. DIMVA 2007: 109-128 |
14 | EE | Jianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu Song, Wei Zou: Collecting Autonomous Spreading Malware Using High-Interaction Honeypots. ICICS 2007: 438-451 |
2006 | ||
13 | Zinaida Benenson, Felix C. Freiling, Thorsten Holz, Dogan Kesdogan, Lucia Draque Penso: Safety, Liveness, and Information Flow: Dependability Revisited. ARCS Workshops 2006: 56-65 | |
12 | Philip Anderson, Maximillian Dornseif, Felix C. Freiling, Thorsten Holz, Alastrair Irons, Christopher Laing, Martin Mink: A Comparative Study of Teaching Forensics at a University Degree Level. IMF 2006: 116-127 | |
11 | EE | Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, Felix C. Freiling: The Nepenthes Platform: An Efficient Approach to Collect Malware. RAID 2006: 165-184 |
10 | Thorsten Holz: Learning More About Attack Patterns With Honeypots. Sicherheit 2006: 30-41 | |
9 | EE | Thorsten Holz, Simon Marechal, Frédéric Raynal: New Threats and Attacks on the World Wide Web. IEEE Security & Privacy 4(2): 72-75 (2006) |
2005 | ||
8 | Maximillian Dornseif, Thorsten Holz, Sven Müller: Honeypots and Limitations of Deception. DFN-Arbeitstagung über Kommunikationsnetze 2005: 235-252 | |
7 | EE | Fabien Pouget, Thorsten Holz: A Pointillist Approach for Comparing Honeypots. DIMVA 2005: 51-68 |
6 | EE | Thorsten Holz: Security Measurements and Metrics for Networks. Dependability Metrics 2005: 157-165 |
5 | EE | Felix C. Freiling, Thorsten Holz, Georg Wicherski: Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks. ESORICS 2005: 319-335 |
4 | EE | Thorsten Holz: A Short Visit to the Bot Zoo. IEEE Security & Privacy 3(3): 76-79 (2005) |
2004 | ||
3 | Maximillian Dornseif, Felix C. Gärtner, Thorsten Holz: Ermittlung von Verwundbarkeiten mit elektronischen Ködern. DIMVA 2004: 129-141 | |
2 | EE | Maximillian Dornseif, Thorsten Holz, Christian N. Klein: NoSEBrEaK - Attacking Honeynets CoRR cs.CR/0406052: (2004) |
1 | EE | Maximillian Dornseif, Felix C. Gärtner, Thorsten Holz: Ermittlung von Verwundbarkeiten mit elektronischen Koedern CoRR cs.CR/0406059: (2004) |