The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Felix C. Freiling: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Zinaida Benenson, Felix C. Freiling, Thorsten Holz, Dogan Kesdogan, Lucia Draque Penso
    Safety, Liveness, and Information Flow: Dependability Revisited. [Citation Graph (0, 0)][DBLP]
    ARCS Workshops, 2006, pp:56-65 [Conf]
  2. Christian Bunse, Felix C. Freiling, Nicole Lévy
    A Taxonomy on Component-Based Software Engineering Methods. [Citation Graph (0, 0)][DBLP]
    Architecting Systems with Trustworthy Components, 2004, pp:103-119 [Conf]
  3. Felix C. Freiling, Thomas Santen
    On the Composition of Compositional Reasoning. [Citation Graph (0, 0)][DBLP]
    Architecting Systems with Trustworthy Components, 2004, pp:137-151 [Conf]
  4. Zinaida Benenson, Felix C. Freiling, Birgit Pfitzmann, Christian Rohner, Michael Waidner
    Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2006, pp:165-178 [Conf]
  5. Milan Fort, Felix C. Freiling, Lucia Draque Penso, Zinaida Benenson, Dogan Kesdogan
    TrustedPals: Secure Multiparty Computation Implemented with Smart Cards. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:34-48 [Conf]
  6. Felix C. Freiling, Thorsten Holz, Georg Wicherski
    Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:319-335 [Conf]
  7. Marc Shapiro, Idit Keidar, Felix C. Freiling, Luís Rodrigues
    Topic 8 - Distributed Systems and Algorithms. [Citation Graph (0, 0)][DBLP]
    Euro-Par, 2005, pp:593- [Conf]
  8. Felix C. Freiling, Neeraj Mittal, Lucia Draque Penso
    Transformations in Secure and Fault-Tolerant Distributed Computation. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (1), 2005, pp:410-412 [Conf]
  9. Carole Delporte-Gallet, Hugues Fauconnier, Felix C. Freiling
    Revisiting Failure Detection and Consensus in Omission Failure Environments. [Citation Graph (0, 0)][DBLP]
    ICTAC, 2005, pp:394-408 [Conf]
  10. Neeraj Mittal, Kuppahalli L. Phaneesh, Felix C. Freiling
    Safe Termination Detection in an Asynchronous Distributed System When Processes May Crash and Recover. [Citation Graph (0, 0)][DBLP]
    OPODIS, 2006, pp:126-141 [Conf]
  11. Felix C. Freiling, Maurice Herlihy, Lucia Draque Penso
    Optimal Randomized Fair Exchange with Secret Shared Coins. [Citation Graph (0, 0)][DBLP]
    OPODIS, 2005, pp:61-72 [Conf]
  12. Zinaida Benenson, Peter M. Cholewinski, Felix C. Freiling
    Simple Evasive Data Storage in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IASTED PDCS, 2005, pp:779-784 [Conf]
  13. Zinaida Benenson, Lexi Pimenidis, Felix C. Freiling, Stefan Lucks
    Authenticated Query Flooding in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2006, pp:644-647 [Conf]
  14. Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, Felix C. Freiling
    The Nepenthes Platform: An Efficient Approach to Collect Malware. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:165-184 [Conf]
  15. Zinaida Benenson, Felix C. Freiling, Ernest Hammerschmidt, Stefan Lucks, Lexi Pimenidis
    Authenticated Query Flooding in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:38-49 [Conf]
  16. Hans-Georg Eßer, Felix C. Freiling
    Kapazitätsmessung eines verdeckten Zeitkanals über HTTP. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2006, pp:115-118 [Conf]
  17. Timo Warns, Felix C. Freiling, Wilhelm Hasselbring
    Solving Consensus Using Structural Failure Models. [Citation Graph (0, 0)][DBLP]
    SRDS, 2006, pp:212-224 [Conf]
  18. Felix C. Freiling, Sukumar Ghosh
    Code Stabilization. [Citation Graph (0, 0)][DBLP]
    Self-Stabilizing Systems, 2005, pp:128-139 [Conf]
  19. Neeraj Mittal, Felix C. Freiling, S. Venkatesan, Lucia Draque Penso
    Efficient Reduction for Wait-Free Termination Detection in a Crash-Prone Distributed System. [Citation Graph (0, 0)][DBLP]
    DISC, 2005, pp:93-107 [Conf]
  20. Felix C. Freiling, Hagen Völzer
    Illustrating the impossibility of crash-tolerant consensus in asynchronous systems. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2006, v:40, n:2, pp:105-109 [Journal]
  21. Felix C. Freiling, Matthias Majuntke, Neeraj Mittal
    On Detecting Termination in the Crash-Recovery Model. [Citation Graph (0, 0)][DBLP]
    Euro-Par, 2007, pp:629-638 [Conf]
  22. Felix C. Freiling, Arshad Jhumka
    Global Predicate Detection in Distributed Systems with Small Faults. [Citation Graph (0, 0)][DBLP]
    SSS, 2007, pp:296-310 [Conf]
  23. Felix C. Freiling, Matthias Majuntke, Neeraj Mittal
    Brief Announcement: Termination Detection in an Asynchronous Distributed System with Crash-Recovery Failures. [Citation Graph (0, 0)][DBLP]
    SSS, 2006, pp:572-573 [Conf]
  24. Roberto Cortiñas, Felix C. Freiling, Marjan Ghajar-Azadanlou, Alberto Lafuente, Mikel Larrea, Lucia Draque Penso, Iratxe Soraluze Arriola
    Secure Failure Detection in TrustedPals. [Citation Graph (0, 0)][DBLP]
    SSS, 2007, pp:173-188 [Conf]
  25. Carole Delporte-Gallet, Hugues Fauconnier, Felix C. Freiling, Lucia Draque Penso, Andreas Tielmann
    From Crash-Stop to Permanent Omission: Automatic Transformation and Weakest Failure Detectors. [Citation Graph (0, 0)][DBLP]
    DISC, 2007, pp:165-178 [Conf]

  26. Query Dissemination with Predictable Reachability and Energy Usage in Sensor Networks. [Citation Graph (, )][DBLP]


  27. 06371 Abstracts Collection -- From Security to Dependability. [Citation Graph (, )][DBLP]


  28. 06371 Executive Summary -- From Security to Dependability. [Citation Graph (, )][DBLP]


  29. Introduction to Security Metrics. [Citation Graph (, )][DBLP]


  30. Introduction to Dependability Metrics. [Citation Graph (, )][DBLP]


  31. Reliability vs. Security: A Subjective Overview. [Citation Graph (, )][DBLP]


  32. On Metrics and Measurements. [Citation Graph (, )][DBLP]


  33. Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones. [Citation Graph (, )][DBLP]


  34. Cooperative Intrusion Detection in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  35. Eine Analyse von 33 Gigabyte gestohlener Keylogger-Daten. [Citation Graph (, )][DBLP]


  36. Multimedia-Forensik als Teildisziplin der digitalen Forensik. [Citation Graph (, )][DBLP]


  37. Message-efficient omission-tolerant consensus with limited synchrony. [Citation Graph (, )][DBLP]


  38. Advanced Evasive Data Storage in Sensor Networks. [Citation Graph (, )][DBLP]


  39. Measuring and Detecting Fast-Flux Service Networks. [Citation Graph (, )][DBLP]


  40. Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. [Citation Graph (, )][DBLP]


  41. Modular Consensus Algorithms for the Crash-Recovery Model. [Citation Graph (, )][DBLP]


  42. Integrating people-centric sensing with social networks: A privacy research agenda. [Citation Graph (, )][DBLP]


  43. ADSandbox: sandboxing JavaScript to fight malicious websites. [Citation Graph (, )][DBLP]


  44. Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients. [Citation Graph (, )][DBLP]


  45. Towards Dynamic Malware Analysis to Increase Mobile Device Security423. [Citation Graph (, )][DBLP]


  46. Iterative Kompromittierungsgraphverfeinerung als methodische Grundlage für Netzwerkpenetrationstests. [Citation Graph (, )][DBLP]


  47. Easy Consensus Algorithms for the Crash-Recovery Model. [Citation Graph (, )][DBLP]


  48. A Common Process Model for Incident Response and Computer Forensics. [Citation Graph (, )][DBLP]


  49. Towards Reliable Rootkit Detection in Live Response. [Citation Graph (, )][DBLP]


  50. Testing Forensic Hash Tools on Sparse Files. [Citation Graph (, )][DBLP]


  51. Reconstructing People's Lives: A Case Study in Teaching Forensic Computing. [Citation Graph (, )][DBLP]


  52. A Comparative Study of Teaching Forensics at a University Degree Level. [Citation Graph (, )][DBLP]


  53. The Forensic Image Generator Generator (Forensig2). [Citation Graph (, )][DBLP]


  54. Is attack better than defense?: teaching information security the right way. [Citation Graph (, )][DBLP]


  55. Multimedia Forensics Is Not Computer Forensics. [Citation Graph (, )][DBLP]


  56. AESSE: a cold-boot resistant implementation of AES. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.009secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002