Publications
Virtual Honeypots - From Botnet Tracking to Intrusion Detection
2007 - Niels Provos, Thorsten Holz
Addison-Wesley Professional; 1. edition, 440 pages [Link]Design and Implementation of the Honey-DVD
2006 - Maximillian Dornseif, Felix Freiling, Nils Gedicke, Thorsten Holz
IEEE Information Assurance Workshop (IAW), West Point, NY, June 2006 [pdf]Learning More About Attack Patterns With Honeypots
2006 - Thorsten Holz
GI Sicherheit - Schutz und Zuverlässigkeit, Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik, Magdeburg, February 2006 [pdf]A Pointillist Approach for Comparing Honeypots
2005 - Fabien Pouget, Thorsten Holz
Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Vienna, Austria, July 2005 [pdf]Detecting Honeypots and Other Suspicious Environments
2005 - Thorsten Holz, Frederic Raynal
IEEE Information Assurance Workshop (IAW), West Point, NY, June 2005 [pdf]Vulnerability Assessment using Honeypots
2004 - Maximillian Dornseif, Felix C. Gärtner, Thorsten Holz
PIK - Praxis der Informationsverarbeitung und Kommunikation, Volume 27, Issue 4, Pages 195-201, December 2004 [pdf]NoSEBrEaK - Attacking Honeynets
2004 - Maximillian Dornseif, Thorsten Holz, Christian N. Klein
IEEE Information Assurance Workshop (IAW), West Point, NY, June 2004 [pdf]Ermittlung von Verwundbarkeiten mit elektronischen Ködern
2004 - Maximillian Dornseif, Felix C. Gärtner, Thorsten Holz
Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Dortmund, Germany, July 2004 [pdf]