Veröffentlichungen
Multilateral Security Considerations for Adaptive Mobile Applications
2005 - Adrian Spalka, Armin B. Cremers, Marcel Winandy
Proceedings of the 2nd International Conference on E-Business and Telecommunication Networks (ICETE 2005), pp. 133-137, INSTICC, 2005.Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks
2005 - Felix Freiling, Thorsten Holz, Georg Wicherski
European Symposium on Research in Computer Security (ESORICS), Milan, Italy, September 2005 [pdf]A Pointillist Approach for Comparing Honeypots
2005 - Fabien Pouget, Thorsten Holz
Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Vienna, Austria, July 2005 [pdf]Detecting Honeypots and Other Suspicious Environments
2005 - Thorsten Holz, Frederic Raynal
IEEE Information Assurance Workshop (IAW), West Point, NY, June 2005 [pdf]
Seite: