Publications
Spying With Bots
2005 - Thorsten Holz
USENIX ;login:, Volume 30, Issue 6, Pages 18-23, December 2005 [Link] [pdf]Security Measurements and Metrics for Networks
2005 - Thorsten Holz
Dependability Metrics (Lecture Notes in Computer Science 4909, Advanced Lectures), pages 157-165, 2005 [Link]Multilateral Security Considerations for Adaptive Mobile Applications
2005 - Adrian Spalka, Armin B. Cremers, Marcel Winandy
Proceedings of the 2nd International Conference on E-Business and Telecommunication Networks (ICETE 2005), pp. 133-137, INSTICC, 2005.Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks
2005 - Felix Freiling, Thorsten Holz, Georg Wicherski
European Symposium on Research in Computer Security (ESORICS), Milan, Italy, September 2005 [pdf]A Pointillist Approach for Comparing Honeypots
2005 - Fabien Pouget, Thorsten Holz
Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Vienna, Austria, July 2005 [pdf]Detecting Honeypots and Other Suspicious Environments
2005 - Thorsten Holz, Frederic Raynal
IEEE Information Assurance Workshop (IAW), West Point, NY, June 2005 [pdf]A Short Visit to the Bot Zoo
2005 - Thorsten Holz
IEEE Security & Privacy, Volume 3, Issue 3, Pages 76-79, May 2005 [pdf]New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy
2005 - Ahmad-Reza Sadeghi, Marcel Winandy, Christian Stüble, Marcel Selhorst, Oska Senft
DuD Heft 9-05, Trusted Computing News.