The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Thorsten Holz: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Zinaida Benenson, Felix C. Freiling, Thorsten Holz, Dogan Kesdogan, Lucia Draque Penso
    Safety, Liveness, and Information Flow: Dependability Revisited. [Citation Graph (0, 0)][DBLP]
    ARCS Workshops, 2006, pp:56-65 [Conf]
  2. Maximillian Dornseif, Thorsten Holz, Sven Müller
    Honeypots and Limitations of Deception. [Citation Graph (0, 0)][DBLP]
    DFN-Arbeitstagung über Kommunikationsnetze, 2005, pp:235-252 [Conf]
  3. Maximillian Dornseif, Felix C. Gärtner, Thorsten Holz
    Ermittlung von Verwundbarkeiten mit elektronischen Ködern. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2004, pp:129-141 [Conf]
  4. Fabien Pouget, Thorsten Holz
    A Pointillist Approach for Comparing Honeypots. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2005, pp:51-68 [Conf]
  5. Felix C. Freiling, Thorsten Holz, Georg Wicherski
    Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:319-335 [Conf]
  6. Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, Felix C. Freiling
    The Nepenthes Platform: An Efficient Approach to Collect Malware. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:165-184 [Conf]
  7. Thorsten Holz
    Learning More About Attack Patterns With Honeypots. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2006, pp:30-41 [Conf]
  8. Maximillian Dornseif, Thorsten Holz, Christian N. Klein
    NoSEBrEaK - Attacking Honeynets [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  9. Maximillian Dornseif, Felix C. Gärtner, Thorsten Holz
    Ermittlung von Verwundbarkeiten mit elektronischen Koedern [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  10. Thorsten Holz
    A Short Visit to the Bot Zoo. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:76-79 [Journal]
  11. Thorsten Holz, Simon Marechal, Frédéric Raynal
    New Threats and Attacks on the World Wide Web. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:2, pp:72-75 [Journal]
  12. Jan Goebel, Thorsten Holz, Carsten Willems
    Measurement and Analysis of Autonomous Spreading Malware in a University Environment. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2007, pp:109-128 [Conf]
  13. Jianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu Song, Wei Zou
    Collecting Autonomous Spreading Malware Using High-Interaction Honeypots. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:438-451 [Conf]

  14. 08102 Working Group -- Requirements for Network Monitoring from an IDS Perspective. [Citation Graph (, )][DBLP]


  15. Security Measurements and Metrics for Networks. [Citation Graph (, )][DBLP]


  16. 8102 Working Group -- Attack Taxonomy. [Citation Graph (, )][DBLP]


  17. Learning and Classification of Malware Behavior. [Citation Graph (, )][DBLP]


  18. Towards Proactive Spam Filtering (Extended Abstract). [Citation Graph (, )][DBLP]


  19. Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones. [Citation Graph (, )][DBLP]


  20. Automatically Generating Models for Botnet Detection. [Citation Graph (, )][DBLP]


  21. Eine Analyse von 33 Gigabyte gestohlener Keylogger-Daten. [Citation Graph (, )][DBLP]


  22. Measuring and Detecting Fast-Flux Service Networks. [Citation Graph (, )][DBLP]


  23. Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. [Citation Graph (, )][DBLP]


  24. Abusing Social Networks for Automated User Profiling. [Citation Graph (, )][DBLP]


  25. Botzilla: detecting the "phoning home" of malicious software. [Citation Graph (, )][DBLP]


  26. ADSandbox: sandboxing JavaScript to fight malicious websites. [Citation Graph (, )][DBLP]


  27. Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients. [Citation Graph (, )][DBLP]


  28. Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries. [Citation Graph (, )][DBLP]


  29. A Practical Attack to De-anonymize Social Network Users. [Citation Graph (, )][DBLP]


  30. Reconstructing People's Lives: A Case Study in Teaching Forensic Computing. [Citation Graph (, )][DBLP]


  31. A Comparative Study of Teaching Forensics at a University Degree Level. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002