|
Search the dblp DataBase
Felix C. Freiling:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Zinaida Benenson, Felix C. Freiling, Thorsten Holz, Dogan Kesdogan, Lucia Draque Penso
Safety, Liveness, and Information Flow: Dependability Revisited. [Citation Graph (0, 0)][DBLP] ARCS Workshops, 2006, pp:56-65 [Conf]
- Christian Bunse, Felix C. Freiling, Nicole Lévy
A Taxonomy on Component-Based Software Engineering Methods. [Citation Graph (0, 0)][DBLP] Architecting Systems with Trustworthy Components, 2004, pp:103-119 [Conf]
- Felix C. Freiling, Thomas Santen
On the Composition of Compositional Reasoning. [Citation Graph (0, 0)][DBLP] Architecting Systems with Trustworthy Components, 2004, pp:137-151 [Conf]
- Zinaida Benenson, Felix C. Freiling, Birgit Pfitzmann, Christian Rohner, Michael Waidner
Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] ESAS, 2006, pp:165-178 [Conf]
- Milan Fort, Felix C. Freiling, Lucia Draque Penso, Zinaida Benenson, Dogan Kesdogan
TrustedPals: Secure Multiparty Computation Implemented with Smart Cards. [Citation Graph (0, 0)][DBLP] ESORICS, 2006, pp:34-48 [Conf]
- Felix C. Freiling, Thorsten Holz, Georg Wicherski
Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:319-335 [Conf]
- Marc Shapiro, Idit Keidar, Felix C. Freiling, Luís Rodrigues
Topic 8 - Distributed Systems and Algorithms. [Citation Graph (0, 0)][DBLP] Euro-Par, 2005, pp:593- [Conf]
- Felix C. Freiling, Neeraj Mittal, Lucia Draque Penso
Transformations in Secure and Fault-Tolerant Distributed Computation. [Citation Graph (0, 0)][DBLP] GI Jahrestagung (1), 2005, pp:410-412 [Conf]
- Carole Delporte-Gallet, Hugues Fauconnier, Felix C. Freiling
Revisiting Failure Detection and Consensus in Omission Failure Environments. [Citation Graph (0, 0)][DBLP] ICTAC, 2005, pp:394-408 [Conf]
- Neeraj Mittal, Kuppahalli L. Phaneesh, Felix C. Freiling
Safe Termination Detection in an Asynchronous Distributed System When Processes May Crash and Recover. [Citation Graph (0, 0)][DBLP] OPODIS, 2006, pp:126-141 [Conf]
- Felix C. Freiling, Maurice Herlihy, Lucia Draque Penso
Optimal Randomized Fair Exchange with Secret Shared Coins. [Citation Graph (0, 0)][DBLP] OPODIS, 2005, pp:61-72 [Conf]
- Zinaida Benenson, Peter M. Cholewinski, Felix C. Freiling
Simple Evasive Data Storage in Sensor Networks. [Citation Graph (0, 0)][DBLP] IASTED PDCS, 2005, pp:779-784 [Conf]
- Zinaida Benenson, Lexi Pimenidis, Felix C. Freiling, Stefan Lucks
Authenticated Query Flooding in Sensor Networks. [Citation Graph (0, 0)][DBLP] PerCom Workshops, 2006, pp:644-647 [Conf]
- Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, Felix C. Freiling
The Nepenthes Platform: An Efficient Approach to Collect Malware. [Citation Graph (0, 0)][DBLP] RAID, 2006, pp:165-184 [Conf]
- Zinaida Benenson, Felix C. Freiling, Ernest Hammerschmidt, Stefan Lucks, Lexi Pimenidis
Authenticated Query Flooding in Sensor Networks. [Citation Graph (0, 0)][DBLP] SEC, 2006, pp:38-49 [Conf]
- Hans-Georg Eßer, Felix C. Freiling
Kapazitätsmessung eines verdeckten Zeitkanals über HTTP. [Citation Graph (0, 0)][DBLP] Sicherheit, 2006, pp:115-118 [Conf]
- Timo Warns, Felix C. Freiling, Wilhelm Hasselbring
Solving Consensus Using Structural Failure Models. [Citation Graph (0, 0)][DBLP] SRDS, 2006, pp:212-224 [Conf]
- Felix C. Freiling, Sukumar Ghosh
Code Stabilization. [Citation Graph (0, 0)][DBLP] Self-Stabilizing Systems, 2005, pp:128-139 [Conf]
- Neeraj Mittal, Felix C. Freiling, S. Venkatesan, Lucia Draque Penso
Efficient Reduction for Wait-Free Termination Detection in a Crash-Prone Distributed System. [Citation Graph (0, 0)][DBLP] DISC, 2005, pp:93-107 [Conf]
- Felix C. Freiling, Hagen Völzer
Illustrating the impossibility of crash-tolerant consensus in asynchronous systems. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 2006, v:40, n:2, pp:105-109 [Journal]
- Felix C. Freiling, Matthias Majuntke, Neeraj Mittal
On Detecting Termination in the Crash-Recovery Model. [Citation Graph (0, 0)][DBLP] Euro-Par, 2007, pp:629-638 [Conf]
- Felix C. Freiling, Arshad Jhumka
Global Predicate Detection in Distributed Systems with Small Faults. [Citation Graph (0, 0)][DBLP] SSS, 2007, pp:296-310 [Conf]
- Felix C. Freiling, Matthias Majuntke, Neeraj Mittal
Brief Announcement: Termination Detection in an Asynchronous Distributed System with Crash-Recovery Failures. [Citation Graph (0, 0)][DBLP] SSS, 2006, pp:572-573 [Conf]
- Roberto Cortiñas, Felix C. Freiling, Marjan Ghajar-Azadanlou, Alberto Lafuente, Mikel Larrea, Lucia Draque Penso, Iratxe Soraluze Arriola
Secure Failure Detection in TrustedPals. [Citation Graph (0, 0)][DBLP] SSS, 2007, pp:173-188 [Conf]
- Carole Delporte-Gallet, Hugues Fauconnier, Felix C. Freiling, Lucia Draque Penso, Andreas Tielmann
From Crash-Stop to Permanent Omission: Automatic Transformation and Weakest Failure Detectors. [Citation Graph (0, 0)][DBLP] DISC, 2007, pp:165-178 [Conf]
Query Dissemination with Predictable Reachability and Energy Usage in Sensor Networks. [Citation Graph (, )][DBLP]
06371 Abstracts Collection -- From Security to Dependability. [Citation Graph (, )][DBLP]
06371 Executive Summary -- From Security to Dependability. [Citation Graph (, )][DBLP]
Introduction to Security Metrics. [Citation Graph (, )][DBLP]
Introduction to Dependability Metrics. [Citation Graph (, )][DBLP]
Reliability vs. Security: A Subjective Overview. [Citation Graph (, )][DBLP]
On Metrics and Measurements. [Citation Graph (, )][DBLP]
Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones. [Citation Graph (, )][DBLP]
Cooperative Intrusion Detection in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Eine Analyse von 33 Gigabyte gestohlener Keylogger-Daten. [Citation Graph (, )][DBLP]
Multimedia-Forensik als Teildisziplin der digitalen Forensik. [Citation Graph (, )][DBLP]
Message-efficient omission-tolerant consensus with limited synchrony. [Citation Graph (, )][DBLP]
Advanced Evasive Data Storage in Sensor Networks. [Citation Graph (, )][DBLP]
Measuring and Detecting Fast-Flux Service Networks. [Citation Graph (, )][DBLP]
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. [Citation Graph (, )][DBLP]
Modular Consensus Algorithms for the Crash-Recovery Model. [Citation Graph (, )][DBLP]
Integrating people-centric sensing with social networks: A privacy research agenda. [Citation Graph (, )][DBLP]
ADSandbox: sandboxing JavaScript to fight malicious websites. [Citation Graph (, )][DBLP]
Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients. [Citation Graph (, )][DBLP]
Towards Dynamic Malware Analysis to Increase Mobile Device Security423. [Citation Graph (, )][DBLP]
Iterative Kompromittierungsgraphverfeinerung als methodische Grundlage für Netzwerkpenetrationstests. [Citation Graph (, )][DBLP]
Easy Consensus Algorithms for the Crash-Recovery Model. [Citation Graph (, )][DBLP]
A Common Process Model for Incident Response and Computer Forensics. [Citation Graph (, )][DBLP]
Towards Reliable Rootkit Detection in Live Response. [Citation Graph (, )][DBLP]
Testing Forensic Hash Tools on Sparse Files. [Citation Graph (, )][DBLP]
Reconstructing People's Lives: A Case Study in Teaching Forensic Computing. [Citation Graph (, )][DBLP]
A Comparative Study of Teaching Forensics at a University Degree Level. [Citation Graph (, )][DBLP]
The Forensic Image Generator Generator (Forensig2). [Citation Graph (, )][DBLP]
Is attack better than defense?: teaching information security the right way. [Citation Graph (, )][DBLP]
Multimedia Forensics Is Not Computer Forensics. [Citation Graph (, )][DBLP]
AESSE: a cold-boot resistant implementation of AES. [Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.007secs
|