Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Felix C. Freiling
@article{DBLP:journals/tissec/OttmannBF24, author = {Jenny Ottmann and Frank Breitinger and Felix C. Freiling}, title = {An Experimental Assessment of Inconsistencies in Memory Forensics}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {1}, pages = {2:1--2:29}, year = {2024}, url = {https://doi.org/10.1145/3628600}, doi = {10.1145/3628600}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/OttmannBF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GruberHF23, author = {Jan Gruber and Christopher James Hargreaves and Felix C. Freiling}, title = {Contamination of digital evidence: Understanding an underexposed risk}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {44}, number = {Supplement}, pages = {301501}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301501}, doi = {10.1016/J.FSIDI.2023.301501}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GruberHF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:series/gidiss/2022, editor = {R{\"{u}}diger Reischuk and Sven Apel and Abraham Bernstein and Felix C. Freiling and Hans{-}Peter Lenhof and Gustaf Neumann and Kay Uwe R{\"{o}}mer and Bj{\"{o}}rn Scheuermann and Nicole Schweikardt and Klaus Wehrle}, title = {Ausgezeichnete Informatikdissertationen 2022}, series = {{LNI}}, volume = {{D-23}}, publisher = {{GI}}, year = {2023}, url = {https://dl.gi.de/handle/20.500.12116/42584}, timestamp = {Fri, 17 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/gidiss/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-12060, author = {Jenny Ottmann and {\"{U}}same Cengiz and Frank Breitinger and Felix C. Freiling}, title = {As if Time Had Stopped - Checking Memory Dumps for Quasi-Instantaneous Consistency}, journal = {CoRR}, volume = {abs/2307.12060}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.12060}, doi = {10.48550/ARXIV.2307.12060}, eprinttype = {arXiv}, eprint = {2307.12060}, timestamp = {Tue, 01 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-12060.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SchneiderDLDF22, author = {Janine Schneider and Linus D{\"{u}}sel and Benedikt Lorch and Julia Drafz and Felix C. Freiling}, title = {Prudent design principles for digital tampering experiments}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301334}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301334}, doi = {10.1016/J.FSIDI.2022.301334}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SchneiderDLDF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SchneiderEF22, author = {Janine Schneider and Maximilian Eichhorn and Felix C. Freiling}, title = {Ambiguous file system partitions}, journal = {Digit. Investig.}, volume = {42}, number = {Supplement}, pages = {301399}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301399}, doi = {10.1016/J.FSIDI.2022.301399}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SchneiderEF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GruberVBF22, author = {Jan Gruber and Lena L. Voigt and Zinaida Benenson and Felix C. Freiling}, title = {Foundations of cybercriminalistics: From general process models to case-specific concretizations in cybercrime investigations}, journal = {Digit. Investig.}, volume = {43}, number = {Supplement}, pages = {301438}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301438}, doi = {10.1016/J.FSIDI.2022.301438}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GruberVBF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/EinzingerRF22, author = {Christoph Einzinger and Christian R{\"{u}}ckert and Felix C. Freiling}, title = {Datenminimierung in der Netzwerkforensik}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {3}, pages = {149--155}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1580-0}, doi = {10.1007/S11623-022-1580-0}, timestamp = {Sat, 19 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/EinzingerRF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GruberF22, author = {Jan Gruber and Felix C. Freiling}, title = {Fighting Evasive Malware}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {5}, pages = {284--290}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1604-9}, doi = {10.1007/S11623-022-1604-9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GruberF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/LatzoHKHCFA22, author = {Tobias Latzo and Andreas Hellmich and Annika Knepper and Lukas Hardi and Tim Phillip Castello{-}Waldow and Felix C. Freiling and Andreas Attenberger}, editor = {Hans P. Reiser and Marcel Kyas}, title = {Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of {DJI} Drone Log Data}, booktitle = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13700}, pages = {329--345}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22295-5\_18}, doi = {10.1007/978-3-031-22295-5\_18}, timestamp = {Mon, 09 Jan 2023 17:58:32 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/LatzoHKHCFA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GruberF22, author = {Jan Gruber and Felix C. Freiling}, editor = {Christian Wressnegger and Delphine Reinhardt and Thomas Barber and Bernhard C. Witt and Daniel Arp and Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann}, title = {Fighting Evasive Malware: How to Pass the Reverse Turing Test By Utilizing a VMI-Based Human Interaction Simulator}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8, 2022}, series = {{LNI}}, volume = {{P-323}}, pages = {49--64}, publisher = {Gesellschaft f{\"{u}}r Informatik, Bonn}, year = {2022}, url = {https://doi.org/10.18420/sicherheit2022\_03}, doi = {10.18420/SICHERHEIT2022\_03}, timestamp = {Tue, 04 Jul 2023 17:42:02 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/GruberF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:series/gidiss/2021, editor = {Steffen H{\"{o}}lldobler and R{\"{u}}diger Reischuk and Sven Apel and Abraham Bernstein and Felix C. Freiling and Hans{-}Peter Lenhof and Gustaf Neumann and Kay Uwe R{\"{o}}mer and Bj{\"{o}}rn Scheuermann and Nicole Schweikardt and Klaus Wehrle}, title = {Ausgezeichnete Informatikdissertationen 2021}, series = {{LNI}}, volume = {{D-22}}, publisher = {{GI}}, year = {2022}, url = {https://dl.gi.de/handle/20.500.12116/39830}, isbn = {978-3-88579-980-1}, timestamp = {Thu, 16 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/gidiss/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MengesLVSPTKPFR21, author = {Florian Menges and Tobias Latzo and Manfred Vielberth and Sabine Sobola and Henrich C. P{\"{o}}hls and Benjamin Taubmann and Johannes K{\"{o}}stler and Alexander Puchta and Felix C. Freiling and Hans P. Reiser and G{\"{u}}nther Pernul}, title = {Towards GDPR-compliant data processing in modern {SIEM} systems}, journal = {Comput. Secur.}, volume = {103}, pages = {102165}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102165}, doi = {10.1016/J.COSE.2020.102165}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MengesLVSPTKPFR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FaustTMF21, author = {Fabian Faust and Aur{\'{e}}lien Thierry and Tilo M{\"{u}}ller and Felix C. Freiling}, title = {Selective Imaging of File System Data on Live Systems}, journal = {Digit. Investig.}, volume = {36 Supplement}, pages = {301115}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301115}, doi = {10.1016/J.FSIDI.2021.301115}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/FaustTMF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/OttmannPSSRF21, author = {Jenny Ottmann and Johannes Pollach and Nicole Scheler and Janine Schneider and Christian R{\"{u}}ckert and Felix C. Freiling}, title = {Zur Blackbox-Problematik im Bereich Mobilfunkforensik}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {8}, pages = {546--552}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1487-1}, doi = {10.1007/S11623-021-1487-1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/OttmannPSSRF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RocklPHMF21, author = {Jonas R{\"{o}}ckl and Mykolai Protsenko and Monika Huber and Tilo M{\"{u}}ller and Felix C. Freiling}, title = {Advanced System Resiliency Based on Virtualization Techniques for IoT Devices}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {455--467}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485836}, doi = {10.1145/3485832.3485836}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/RocklPHMF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/gidiss/2020, editor = {Steffen H{\"{o}}lldobler and Sven Apel and Abraham Bernstein and Felix C. Freiling and Hans{-}Peter Lenhof and Gustaf Neumann and R{\"{u}}diger Reischuk and Kay Uwe R{\"{o}}mer and Bj{\"{o}}rn Scheuermann and Nicole Schweikardt and Myra Spiliopoulou and Sabine S{\"{u}}sstrunk and Klaus Wehrle}, title = {Ausgezeichnete Informatikdissertationen 2020}, series = {{LNI}}, volume = {{D-21}}, publisher = {{GI}}, year = {2021}, url = {https://dl.gi.de/handle/20.500.12116/37893}, isbn = {978-3-88579-775-3}, timestamp = {Thu, 16 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/gidiss/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MullanRF20, author = {Patrick Mullan and Christian Riess and Felix C. Freiling}, title = {Towards Open-Set Forensic Source Grouping on {JPEG} Header Information}, journal = {Digit. Investig.}, volume = {32 Supplement}, pages = {300916}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300916}, doi = {10.1016/J.FSIDI.2020.300916}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MullanRF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LatzoBF20, author = {Tobias Latzo and Julian Brost and Felix C. Freiling}, title = {BMCLeech: Introducing Stealthy Memory Forensics to {BMC}}, journal = {Digit. Investig.}, volume = {32 Supplement}, pages = {300919}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300919}, doi = {10.1016/J.FSIDI.2020.300919}, timestamp = {Wed, 27 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/LatzoBF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SchneiderWF20, author = {Janine Schneider and Julian Wolf and Felix C. Freiling}, title = {Tampering with Digital Evidence is Hard: The Case of Main Memory Images}, journal = {Digit. Investig.}, volume = {32 Supplement}, pages = {300924}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300924}, doi = {10.1016/J.FSIDI.2020.300924}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SchneiderWF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SchneiderDMF20, author = {Janine Schneider and Hans{-}Peter Deifel and Stefan Milius and Felix C. Freiling}, title = {Unifying Metadata-Based Storage Reconstruction and Carving with {LAYR}}, journal = {Digit. Investig.}, volume = {33 Supplement}, pages = {301006}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301006}, doi = {10.1016/J.FSIDI.2020.301006}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SchneiderDMF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/BuschNFRSF20, author = {Marcel Busch and Florian Nicolai and Fabian Fleischer and Christian R{\"{u}}ckert and Christoph Safferling and Felix C. Freiling}, editor = {Sanjay Goel and Pavel Gladyshev and Daryl Johnson and Makan Pourzandi and Suryadipta Majumdar}, title = {Make Remote Forensic Investigations Forensic Again: Increasing the Evidential Value of Remote Forensic Investigations}, booktitle = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference, {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {351}, pages = {23--43}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68734-2\_2}, doi = {10.1007/978-3-030-68734-2\_2}, timestamp = {Fri, 19 Apr 2024 15:03:30 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/BuschNFRSF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/PalutkeRWF20, author = {Ralph Palutke and Simon Ruderich and Matthias Wild and Felix C. Freiling}, editor = {Manuel Egele and Leyla Bilge}, title = {HyperLeech: Stealthy System Virtualization with Minimal Target Impact through DMA-Based Hypervisor Injection}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {165--179}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/palutke}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/raid/PalutkeRWF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sadfe/GrossDF20, author = {Tobias Gro{\ss} and Richard Dirauf and Felix C. Freiling}, title = {Systematic Analysis of Browser History Evidence}, booktitle = {13th International Conference on Systematic Approaches to Digital Forensic Engineering, {SADFE} 2020, New York, NY, USA, May 15, 2020}, pages = {1--12}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SADFE51007.2020.00010}, doi = {10.1109/SADFE51007.2020.00010}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sadfe/GrossDF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MullerMF20, author = {Nico M{\"{u}}ller and Tilo M{\"{u}}ller and Felix C. Freiling}, editor = {Delphine Reinhardt and Hanno Langweg and Bernhard C. Witt and Mathias Fischer}, title = {Urheberrecht ./. Sicherheitsanalyse}, booktitle = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz 2020, G{\"{o}}ttingen}, series = {{LNI}}, volume = {{P-301}}, pages = {105--115}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2020}, url = {https://doi.org/10.18420/sicherheit2020\_08}, doi = {10.18420/SICHERHEIT2020\_08}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/MullerMF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MorgnerMKFB20, author = {Philipp Morgner and Christoph Mai and Nicole Koschate{-}Fischer and Felix C. Freiling and Zinaida Benenson}, title = {Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {429--446}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00021}, doi = {10.1109/SP40000.2020.00021}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/MorgnerMKFB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/gidiss/2019, editor = {Steffen H{\"{o}}lldobler and Sven Apel and Abraham Bernstein and Felix C. Freiling and Hans{-}Peter Lenhof and Gustaf Neumann and R{\"{u}}diger Reischuk and Kay Uwe R{\"{o}}mer and Bj{\"{o}}rn Scheuermann and Nicole Schweikardt and Myra Spiliopoulou and Sabine S{\"{u}}sstrunk and Klaus Wehrle}, title = {Ausgezeichnete Informatikdissertationen 2019}, series = {{LNI}}, volume = {{D-20}}, publisher = {{GI}}, year = {2020}, url = {https://dl.gi.de/handle/20.500.12116/37999}, isbn = {978-3-88579-775-3}, timestamp = {Thu, 16 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/gidiss/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-02573, author = {Fabian Faust and Aur{\'{e}}lien Thierry and Tilo M{\"{u}}ller and Felix C. Freiling}, title = {Technical Report: Selective Imaging of File System Data on Live Systems}, journal = {CoRR}, volume = {abs/2012.02573}, year = {2020}, url = {https://arxiv.org/abs/2012.02573}, eprinttype = {arXiv}, eprint = {2012.02573}, timestamp = {Wed, 09 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-02573.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LatzoPF19, author = {Tobias Latzo and Ralph Palutke and Felix C. Freiling}, title = {A universal taxonomy and survey of forensic memory acquisition techniques}, journal = {Digit. Investig.}, volume = {28}, number = {Supplement}, pages = {56--69}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.001}, doi = {10.1016/J.DIIN.2019.01.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/LatzoPF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MullanRF19, author = {Patrick Mullan and Christian Riess and Felix C. Freiling}, title = {Forensic source identification using {JPEG} image headers: The case of smartphones}, journal = {Digit. Investig.}, volume = {28 Supplement}, pages = {S68--S76}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.016}, doi = {10.1016/J.DIIN.2019.01.016}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/MullanRF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/insk/SchillerFBM19, author = {Jan Schiller and Felix C. Freiling and Zinaida Benenson and Werner Massonne}, title = {Berufsbegleitendes Studieren an Universit{\"{a}}ten - Ein Zukunftsfeld f{\"{u}}r die IT-Sicherheit}, journal = {Inform. Spektrum}, volume = {42}, number = {1}, pages = {38--47}, year = {2019}, url = {https://doi.org/10.1007/s00287-019-01145-6}, doi = {10.1007/S00287-019-01145-6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/insk/SchillerFBM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaeneGMCFV19, author = {Pieter Maene and Johannes G{\"{o}}tzfried and Tilo M{\"{u}}ller and Ruan de Clercq and Felix C. Freiling and Ingrid Verbauwhede}, title = {Atlas: Application Confidentiality in Compromised Embedded Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {3}, pages = {415--423}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2018.2858257}, doi = {10.1109/TDSC.2018.2858257}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MaeneGMCFV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cecc/SchorradtBF19, author = {Stefan Schorradt and Edita Bajramovic and Felix C. Freiling}, title = {On the Feasibility of Secure Logging for Industrial Control Systems Using Blockchain}, booktitle = {Proceedings of the Third Central European Cybersecurity Conference, {CECC} 2019, Munich, Germany, November 14-15, 2019}, pages = {4:1--4:6}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3360664.3360668}, doi = {10.1145/3360664.3360668}, timestamp = {Mon, 28 Oct 2019 08:10:46 +0100}, biburl = {https://dblp.org/rec/conf/cecc/SchorradtBF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cecc/AbdullahHF19, author = {Lamya Abdullah and Sebastian Hahn and Felix C. Freiling}, title = {Achieving Consistency of Software Updates against Strong Attackers}, booktitle = {Proceedings of the Third Central European Cybersecurity Conference, {CECC} 2019, Munich, Germany, November 14-15, 2019}, pages = {6:1--6:6}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3360664.3360670}, doi = {10.1145/3360664.3360670}, timestamp = {Mon, 28 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cecc/AbdullahHF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LatzoF19, author = {Tobias Latzo and Felix C. Freiling}, title = {Characterizing the Limitations of Forensic Event Reconstruction Based on Log Files}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {466--475}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00069}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00069}, timestamp = {Thu, 14 Nov 2019 10:35:10 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LatzoF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/gidiss/2018, editor = {Sven Apel and Abraham Bernstein and Felix C. Freiling and Steffen H{\"{o}}lldobler and Hans{-}Peter Lenhof and Paul Molitor and Gustaf Neumann and R{\"{u}}diger Reischuk and Bj{\"{o}}rn Scheuermann and Nicole Schweikardt and Myra Spiliopoulou and Sabine S{\"{u}}sstrunk and Klaus Wehrle}, title = {Ausgezeichnete Informatikdissertationen 2018}, series = {{LNI}}, volume = {{D-19}}, publisher = {{GI}}, year = {2019}, url = {https://dl.gi.de/handle/20.500.12116/36723}, isbn = {978-3-88579-977-1}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/gidiss/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-07841, author = {Lamya Abdullah and Felix C. Freiling and Juan Quintero and Zinaida Benenson}, title = {Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing}, journal = {CoRR}, volume = {abs/1906.07841}, year = {2019}, url = {http://arxiv.org/abs/1906.07841}, eprinttype = {arXiv}, eprint = {1906.07841}, timestamp = {Mon, 24 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-07841.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-11094, author = {Philipp Morgner and Christoph Mai and Nicole Koschate{-}Fischer and Felix C. Freiling and Zinaida Benenson}, title = {Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products}, journal = {CoRR}, volume = {abs/1906.11094}, year = {2019}, url = {http://arxiv.org/abs/1906.11094}, eprinttype = {arXiv}, eprint = {1906.11094}, timestamp = {Thu, 27 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-11094.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NemetzSF18, author = {Sebastian Nemetz and Sven Schmitt and Felix C. Freiling}, title = {A standardized corpus for SQLite database forensics}, journal = {Digit. Investig.}, volume = {24 Supplement}, pages = {S121--S130}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.01.015}, doi = {10.1016/J.DIIN.2018.01.015}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/NemetzSF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PalutkeF18, author = {Ralph Palutke and Felix C. Freiling}, title = {Styx: Countering robust memory acquisition}, journal = {Digit. Investig.}, volume = {24 Supplement}, pages = {S18--S28}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.01.004}, doi = {10.1016/J.DIIN.2018.01.004}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/PalutkeF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FreilingH18, author = {Felix C. Freiling and Leonhard H{\"{o}}sch}, title = {Controlled experiments in digital evidence tampering}, journal = {Digit. Investig.}, volume = {24 Supplement}, pages = {S83--S92}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.01.011}, doi = {10.1016/J.DIIN.2018.01.011}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/FreilingH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dt/FreilingGLMP18, author = {Felix C. Freiling and Tobias Gro{\ss} and Tobias Latzo and Tilo M{\"{u}}ller and Ralph Palutke}, title = {Advances in Forensic Data Acquisition}, journal = {{IEEE} Des. Test}, volume = {35}, number = {5}, pages = {63--74}, year = {2018}, url = {https://doi.org/10.1109/MDAT.2018.2862366}, doi = {10.1109/MDAT.2018.2862366}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dt/FreilingGLMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/MaeneGCMFV18, author = {Pieter Maene and Johannes G{\"{o}}tzfried and Ruan de Clercq and Tilo M{\"{u}}ller and Felix C. Freiling and Ingrid Verbauwhede}, title = {Hardware-Based Trusted Computing Architectures for Isolation and Attestation}, journal = {{IEEE} Trans. Computers}, volume = {67}, number = {3}, pages = {361--374}, year = {2018}, url = {https://doi.org/10.1109/TC.2017.2647955}, doi = {10.1109/TC.2017.2647955}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/MaeneGCMFV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AbdullahFQB18, author = {Lamya Abdullah and Felix C. Freiling and Juan Quintero and Zinaida Benenson}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Annie I. Ant{\'{o}}n and Stefanos Gritzalis and John Mylopoulos and Christos Kalloniatis}, title = {Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing}, booktitle = {Computer Security - {ESORICS} 2018 International Workshops, CyberICPS 2018 and {SECPRE} 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11387}, pages = {137--152}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12786-2\_9}, doi = {10.1007/978-3-030-12786-2\_9}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AbdullahFQB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/HanschSPFB18, author = {Norman H{\"{a}}nsch and Andrea Schankin and Mykolai Protsenko and Felix C. Freiling and Zinaida Benenson}, editor = {Mary Ellen Zurko and Heather Richter Lipford}, title = {Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently}, booktitle = {Fourteenth Symposium on Usable Privacy and Security, {SOUPS} 2018, Baltimore, MD, USA, August 12-14, 2018}, pages = {341--356}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/soups2018/presentation/hansch}, timestamp = {Mon, 01 Feb 2021 08:41:57 +0100}, biburl = {https://dblp.org/rec/conf/soups/HanschSPFB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MorgnerFB18, author = {Philipp Morgner and Felix C. Freiling and Zinaida Benenson}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Opinion: Security Lifetime Labels - Overcoming Information Asymmetry in Security of IoT Consumer Products}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {208--211}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212486}, doi = {10.1145/3212480.3212486}, timestamp = {Mon, 16 Sep 2019 13:25:53 +0200}, biburl = {https://dblp.org/rec/conf/wisec/MorgnerFB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:conf/gi/2017diss, editor = {Sven Apel and Abraham Bernstein and Wolfgang Effelsberg and Felix C. Freiling and Steffen H{\"{o}}lldobler and Hans{-}Peter Lenhof and Paul Molitor and Gustaf Neumann and R{\"{u}}diger Reischuk and Nicole Schweikardt and Bj{\"{o}}rn Scheuermann and Myra Spiliopoulou and Sabine S{\"{u}}sstrunk}, title = {Ausgezeichnete Informatikdissertationen 2017}, series = {{LNI}}, volume = {{D-18}}, publisher = {{GI}}, year = {2018}, url = {https://dl.gi.de/handle/20.500.12116/19456}, isbn = {978-3-88579-977-1}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gi/2017diss.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FreilingGR17, author = {Felix C. Freiling and Thomas Glanzmann and Hans P. Reiser}, title = {Characterizing loss of digital evidence due to abstraction layers}, journal = {Digit. Investig.}, volume = {20 Supplement}, pages = {S107--S115}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.01.012}, doi = {10.1016/J.DIIN.2017.01.012}, timestamp = {Wed, 27 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/FreilingGR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FreilingZ17, author = {Felix C. Freiling and Christian Zoubek}, title = {Do digital investigators have to program? {A} controlled experiment in digital investigation}, journal = {Digit. Investig.}, volume = {20 Supplement}, pages = {S37--S46}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.01.004}, doi = {10.1016/J.DIIN.2017.01.004}, timestamp = {Thu, 30 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/FreilingZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/NoormanBMPMPVGM17, author = {Job Noorman and Jo Van Bulck and Jan Tobias M{\"{u}}hlberg and Frank Piessens and Pieter Maene and Bart Preneel and Ingrid Verbauwhede and Johannes G{\"{o}}tzfried and Tilo M{\"{u}}ller and Felix C. Freiling}, title = {Sancus 2.0: {A} Low-Cost Security Architecture for IoT Devices}, journal = {{ACM} Trans. Priv. Secur.}, volume = {20}, number = {3}, pages = {7:1--7:33}, year = {2017}, url = {https://doi.org/10.1145/3079763}, doi = {10.1145/3079763}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/NoormanBMPMPVGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:conf/gi/2016diss, editor = {Abraham Bernstein and Wolfgang Effelsberg and Felix C. Freiling and Steffen H{\"{o}}lldobler and Hans{-}Peter Lenhof and Paul Molitor and Gustaf Neumann and R{\"{u}}diger Reischuk and Nicole Schweikardt and Myra Spiliopoulou and Sabine S{\"{u}}sstrunk}, title = {Ausgezeichnete Informatikdissertationen 2016}, series = {{LNI}}, volume = {{D-17}}, publisher = {{GI}}, year = {2017}, url = {https://dl.gi.de/handle/20.500.12116/19926}, isbn = {978-3-88579-976-4}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gi/2016diss.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GruhnF16, author = {Michael Gruhn and Felix C. Freiling}, title = {Evaluating atomicity, and integrity of correct memory acquisition methods}, journal = {Digit. Investig.}, volume = {16 Supplement}, pages = {S1--S10}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.01.003}, doi = {10.1016/J.DIIN.2016.01.003}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/GruhnF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/0004GF16, author = {Johannes Bauer and Michael Gruhn and Felix C. Freiling}, title = {Lest we forget: Cold-boot attacks on scrambled {DDR3} memory}, journal = {Digit. Investig.}, volume = {16 Supplement}, pages = {S65--S74}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.01.009}, doi = {10.1016/J.DIIN.2016.01.009}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/0004GF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/StritterFKRUGED16, author = {Benjamin Stritter and Felix C. Freiling and Hartmut K{\"{o}}nig and Ren{\'{e}} Rietz and Steffen Ullrich and Alexander von Gernler and Felix Erlacher and Falko Dressler}, title = {Cleaning up Web 2.0's Security Mess-at Least Partly}, journal = {{IEEE} Secur. Priv.}, volume = {14}, number = {2}, pages = {48--57}, year = {2016}, url = {https://doi.org/10.1109/MSP.2016.31}, doi = {10.1109/MSP.2016.31}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/StritterFKRUGED16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/insk/Freiling16, author = {Felix C. Freiling}, title = {Staatliche Sp{\"{a}}hsoftware zur Strafverfolgung - Zur Verh{\"{a}}ltnism{\"{a}}{\ss}igkeit einer umstrittenen Ma{\ss}nahme}, journal = {Inform. Spektrum}, volume = {39}, number = {3}, pages = {203--209}, year = {2016}, url = {https://doi.org/10.1007/s00287-015-0912-y}, doi = {10.1007/S00287-015-0912-Y}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/insk/Freiling16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/it/DrescherEFGLMMV16, author = {Gabor Drescher and Christoph Erhardt and Felix C. Freiling and Johannes G{\"{o}}tzfried and Daniel Lohmann and Pieter Maene and Tilo M{\"{u}}ller and Ingrid Verbauwhede and Andreas Weichslgartner and Stefan Wildermann}, title = {Providing security on demand using invasive computing}, journal = {it Inf. Technol.}, volume = {58}, number = {6}, pages = {281--295}, year = {2016}, url = {https://doi.org/10.1515/itit-2016-0032}, doi = {10.1515/ITIT-2016-0032}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/it/DrescherEFGLMMV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/KurtzGBRF16, author = {Andreas Kurtz and Hugo Gascon and Tobias Becker and Konrad Rieck and Felix C. Freiling}, title = {Fingerprinting Mobile Devices Using Personalized Configurations}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2016}, number = {1}, pages = {4--19}, year = {2016}, url = {https://doi.org/10.1515/popets-2015-0027}, doi = {10.1515/POPETS-2015-0027}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/KurtzGBRF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BauerF16, author = {Johannes Bauer and Felix C. Freiling}, title = {Towards Cycle-Accurate Emulation of Cortex-M Code to Detect Timing Side Channels}, booktitle = {11th International Conference on Availability, Reliability and Security, {ARES} 2016, Salzburg, Austria, August 31 - September 2, 2016}, pages = {49--58}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ARES.2016.94}, doi = {10.1109/ARES.2016.94}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/BauerF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/BauerSFD16, author = {Johannes Bauer and Sebastian Schinzel and Felix C. Freiling and Andreas Dewald}, editor = {William H. Robinson and Swarup Bhunia and Ryan Kastner}, title = {Information leakage behind the curtain: Abusing anti-EMI features for covert communication}, booktitle = {2016 {IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2016, McLean, VA, USA, May 3-5, 2016}, pages = {130--134}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/HST.2016.7495570}, doi = {10.1109/HST.2016.7495570}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/BauerSFD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scopes/WeichslgartnerW16, author = {Andreas Weichslgartner and Stefan Wildermann and Johannes G{\"{o}}tzfried and Felix C. Freiling and Michael Gla{\ss} and J{\"{u}}rgen Teich}, editor = {Sander Stuijk}, title = {Design-Time/Run-Time Mapping of Security-Critical Applications in Heterogeneous MPSoCs}, booktitle = {Proceedings of the 19th International Workshop on Software and Compilers for Embedded Systems, {SCOPES} 2016, Sankt Goar, Germany, May 23-25, 2016}, pages = {153--162}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2906363.2906370}, doi = {10.1145/2906363.2906370}, timestamp = {Tue, 06 Nov 2018 16:58:57 +0100}, biburl = {https://dblp.org/rec/conf/scopes/WeichslgartnerW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:conf/gi/2015diss, editor = {Abraham Bernstein and Wolfgang Effelsberg and Felix C. Freiling and Steffen H{\"{o}}lldobler and Hans{-}Peter Lenhof and Paul Molitor and Gustaf Neumann and R{\"{u}}diger Reischuk and Nicole Schweikardt and Myra Spiliopoulou and Harald St{\"{o}}rrle and Sabine S{\"{u}}sstrunk}, title = {Ausgezeichnete Informatikdissertationen 2015}, series = {{LNI}}, volume = {{D-16}}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/4410}, isbn = {978-3-88579-975-7}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gi/2015diss.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AnikeevFGM15, author = {Maxim Anikeev and Felix C. Freiling and Johannes G{\"{o}}tzfried and Tilo M{\"{u}}ller}, title = {Secure garbage collection: Preventing malicious data harvesting from deallocated Java objects inside the Dalvik {VM}}, journal = {J. Inf. Secur. Appl.}, volume = {22}, pages = {81--86}, year = {2015}, url = {https://doi.org/10.1016/j.jisa.2014.10.001}, doi = {10.1016/J.JISA.2014.10.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AnikeevFGM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/it/Freiling15, author = {Felix C. Freiling}, title = {From {IT} forensics to forensic computing}, journal = {it Inf. Technol.}, volume = {57}, number = {6}, pages = {337--338}, year = {2015}, url = {http://www.degruyter.com/view/j/itit.2015.57.issue-6/itit-2015-0039/itit-2015-0039.xml}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/it/Freiling15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/it/FreilingSG15, author = {Felix C. Freiling and Jan C. Schuhr and Michael Gruhn}, title = {What is essential data in digital forensic analysis?}, journal = {it Inf. Technol.}, volume = {57}, number = {6}, pages = {376--383}, year = {2015}, url = {http://www.degruyter.com/view/j/itit.2015.57.issue-6/itit-2015-0016/itit-2015-0016.xml}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/it/FreilingSG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MullerF15, author = {Tilo M{\"{u}}ller and Felix C. Freiling}, title = {A Systematic Assessment of the Security of Full Disk Encryption}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {5}, pages = {491--503}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2369041}, doi = {10.1109/TDSC.2014.2369041}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MullerF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GotzfriedMCMFV15, author = {Johannes G{\"{o}}tzfried and Tilo M{\"{u}}ller and Ruan de Clercq and Pieter Maene and Felix C. Freiling and Ingrid Verbauwhede}, title = {Soteria: Offline Software Protection within Low-cost Embedded Devices}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {241--250}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2856129}, doi = {10.1145/2818000.2856129}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GotzfriedMCMFV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imf/FreilingG15, author = {Felix C. Freiling and Michael Gruhn}, editor = {Jana Dittmann and Holger Morgenstern}, title = {What is Essential Data in Digital Forensic Analysis?}, booktitle = {Ninth International Conference on {IT} Security Incident Management {\&} {IT} Forensics, {IMF} 2015, Magdeburg, Germany, May 18-20, 2015}, pages = {40--48}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/IMF.2015.20}, doi = {10.1109/IMF.2015.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imf/FreilingG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:conf/gi/2014diss, editor = {Abraham Bernstein and Wolfgang Effelsberg and Felix C. Freiling and Steffen H{\"{o}}lldobler and Hans{-}Peter Lenhof and Paul Molitor and Gustaf Neumann and R{\"{u}}diger Reischuk and Nicole Schweikardt and Myra Spiliopoulou and Harald St{\"{o}}rrle and Sabine S{\"{u}}sstrunk}, title = {Ausgezeichnete Informatikdissertationen 2014}, series = {{LNI}}, volume = {{D-15}}, publisher = {{GI}}, year = {2015}, url = {https://dl.gi.de/handle/20.500.12116/4412}, isbn = {978-3-88579-419-6}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gi/2014diss.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FreilingS14, author = {Felix C. Freiling and Konstantin Sack}, title = {Selektive Datensicherungen in der IT-Forensik}, journal = {Datenschutz und Datensicherheit}, volume = {38}, number = {2}, pages = {112--117}, year = {2014}, url = {https://doi.org/10.1007/s11623-014-0043-7}, doi = {10.1007/S11623-014-0043-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FreilingS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/insk/FreilingGGKMMRS14, author = {Felix C. Freiling and R{\"{u}}diger Grimm and Karl{-}Erwin Gro{\ss}pietsch and Hubert B. Keller and J{\"{u}}rgen Mottok and Isabel M{\"{u}}nch and Kai Rannenberg and Francesca Saglietti}, title = {Technische Sicherheit und Informationssicherheit - Unterschiede und Gemeinsamkeiten}, journal = {Inform. Spektrum}, volume = {37}, number = {1}, pages = {14--24}, year = {2014}, url = {https://doi.org/10.1007/s00287-013-0748-2}, doi = {10.1007/S00287-013-0748-2}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/insk/FreilingGGKMMRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/ZhuangPMF14, author = {Yan Zhuang and Mykola Protsenko and Tilo M{\"{u}}ller and Felix C. Freiling}, title = {An(other) Exercise in Measuring the Strength of Source Code Obfuscation}, booktitle = {25th International Workshop on Database and Expert Systems Applications, {DEXA} 2014, Munich, Germany, September 1-5, 2014}, pages = {313--317}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/DEXA.2014.69}, doi = {10.1109/DEXA.2014.69}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/ZhuangPMF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/FreilingPZ14, author = {Felix C. Freiling and Mykola Protsenko and Yan Zhuang}, editor = {Jing Tian and Jiwu Jing and Mudhakar Srivatsa}, title = {An Empirical Evaluation of Software Obfuscation Techniques Applied to Android APKs}, booktitle = {International Conference on Security and Privacy in Communication Networks - 10th International {ICST} Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {153}, pages = {315--328}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-23802-9\_24}, doi = {10.1007/978-3-319-23802-9\_24}, timestamp = {Tue, 23 May 2017 01:12:12 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/FreilingPZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/KurtzTF14, author = {Andreas Kurtz and Markus Tro{\ss}bach and Felix C. Freiling}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Snoop-it: Dynamische Analyse und Manipulation von Apple iOS Apps}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {13--23}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20046}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/KurtzTF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/HintzEBF14, author = {Nadina Hintz and Markus Engelberth and Zinaida Benenson and Felix C. Freiling}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Phishing still works: Erfahrungen und Lehren aus der Durchf{\"{u}}hrung von Phishing-Experimenten}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {37--51}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20067}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/HintzEBF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BrodowskiDFKR14, author = {Dominik Brodowski and Andreas Dewald and Felix C. Freiling and Steve Kov{\'{a}}cs and Martin Rieger}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Drei Jahre Master Online Digitale Forensik: Ergebnisse und Erfahrungen}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {391--405}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20059}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BrodowskiDFKR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/imf/2014, editor = {Felix C. Freiling and Holger Morgenstern and Sandra Frings and Oliver G{\"{o}}bel and Detlef G{\"{u}}nther and Jens Nedon and Dirk Schadt}, title = {Eighth International Conference on {IT} Security Incident Management {\&} {IT} Forensics, {IMF} 2014, M{\"{u}}nster, Germany, May 12-14, 2014}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/6823828/proceeding}, isbn = {978-1-4799-4330-2}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imf/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pik/Freiling13, author = {Felix C. Freiling}, title = {Im Fokus: Technische und menschliche Aspekte von Cyberkriminalit{\"{a}}t}, journal = {Prax. Inf.verarb. Kommun.}, volume = {36}, number = {3}, pages = {199--200}, year = {2013}, url = {https://doi.org/10.1515/pik-2013-0008}, doi = {10.1515/PIK-2013-0008}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pik/Freiling13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MullerSMF13, author = {Tilo M{\"{u}}ller and Hans Spath and Richard M{\"{a}}ckl and Felix C. Freiling}, editor = {Ahmad{-}Reza Sadeghi}, title = {Stark - Tamperproof Authentication to Resist Keylogging}, booktitle = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7859}, pages = {295--312}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39884-1\_25}, doi = {10.1007/978-3-642-39884-1\_25}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/MullerSMF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imf/StuttgenDF13, author = {Johannes St{\"{u}}ttgen and Andreas Dewald and Felix C. Freiling}, editor = {Holger Morgenstern and Ralf Ehlert and Felix C. Freiling and Sandra Frings and Oliver G{\"{o}}bel and Detlef G{\"{u}}nther and Stefan Kiltz and Jens Nedon and Dirk Schadt}, title = {Selective Imaging Revisited}, booktitle = {Seventh International Conference on {IT} Security Incident Management and {IT} Forensics, {IMF} 2013, Nuremberg, Germany, March 12-14, 2013}, pages = {45--58}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/IMF.2013.16}, doi = {10.1109/IMF.2013.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imf/StuttgenDF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imf/WundramFM13, author = {Martin Wundram and Felix C. Freiling and Christian Moch}, editor = {Holger Morgenstern and Ralf Ehlert and Felix C. Freiling and Sandra Frings and Oliver G{\"{o}}bel and Detlef G{\"{u}}nther and Stefan Kiltz and Jens Nedon and Dirk Schadt}, title = {Anti-forensics: The Next Step in Digital Forensics Tool Testing}, booktitle = {Seventh International Conference on {IT} Security Incident Management and {IT} Forensics, {IMF} 2013, Nuremberg, Germany, March 12-14, 2013}, pages = {83--97}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/IMF.2013.17}, doi = {10.1109/IMF.2013.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imf/WundramFM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imf/KalberDF13, author = {Sven K{\"{a}}lber and Andreas Dewald and Felix C. Freiling}, editor = {Holger Morgenstern and Ralf Ehlert and Felix C. Freiling and Sandra Frings and Oliver G{\"{o}}bel and Detlef G{\"{u}}nther and Stefan Kiltz and Jens Nedon and Dirk Schadt}, title = {Forensic Application-Fingerprinting Based on File System Metadata}, booktitle = {Seventh International Conference on {IT} Security Incident Management and {IT} Forensics, {IMF} 2013, Nuremberg, Germany, March 12-14, 2013}, pages = {98--112}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/IMF.2013.20}, doi = {10.1109/IMF.2013.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imf/KalberDF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/ZwangerF13, author = {Viviane Zwanger and Felix C. Freiling}, editor = {Jeffrey Todd McDonald and Mila Dalla Preda}, title = {Kernel mode {API} spectroscopy for incident response and digital forensics}, booktitle = {Proceedings of the 2nd {ACM} {SIGPLAN} Program Protection and Reverse Engineering Workshop 2013, PPREW@POPL 2013, January 26, 2013, Rome, Italy}, pages = {3:1--3:11}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2430553.2430556}, doi = {10.1145/2430553.2430556}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/ZwangerF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/SpreitzenbarthFESH13, author = {Michael Spreitzenbarth and Felix C. Freiling and Florian Echtler and Thomas Schreck and Johannes Hoffmann}, editor = {Sung Y. Shin and Jos{\'{e}} Carlos Maldonado}, title = {Mobile-sandbox: having a deeper look into android applications}, booktitle = {Proceedings of the 28th Annual {ACM} Symposium on Applied Computing, {SAC} '13, Coimbra, Portugal, March 18-22, 2013}, pages = {1808--1815}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2480362.2480701}, doi = {10.1145/2480362.2480701}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/SpreitzenbarthFESH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/AnikeevF13, author = {Maxim Anikeev and Felix C. Freiling}, editor = {Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Oleg B. Makarevich}, title = {Preventing malicious data harvesting from deallocated memory areas}, booktitle = {The 6th International Conference on Security of Information and Networks, {SIN} '13, Aksaray, Turkey, November 26-28, 2013}, pages = {448--449}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523514.2527022}, doi = {10.1145/2523514.2527022}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/AnikeevF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/others/13/DewaldFSSV13, author = {Andreas Dewald and Felix C. Freiling and Sven Schmitt and Michael Spreitzenbarth and Stefan V{\"{o}}mel}, editor = {Sandro Gaycken}, title = {Systematische Probleme und Grenzen der forensischen Informatik}, booktitle = {Jenseits von 1984 - Datenschutz und {\"{U}}berwachung in der fortgeschrittenen Informationsgesellschaft: eine Versachlichung}, pages = {101--118}, publisher = {transcript Verlag}, year = {2013}, timestamp = {Thu, 04 Jun 2020 17:28:47 +0200}, biburl = {https://dblp.org/rec/books/others/13/DewaldFSSV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/imf/2013, editor = {Holger Morgenstern and Ralf Ehlert and Felix C. Freiling and Sandra Frings and Oliver G{\"{o}}bel and Detlef G{\"{u}}nther and Stefan Kiltz and Jens Nedon and Dirk Schadt}, title = {Seventh International Conference on {IT} Security Incident Management and {IT} Forensics, {IMF} 2013, Nuremberg, Germany, March 12-14, 2013}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6568360/proceeding}, isbn = {978-1-4673-6307-5}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imf/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/FreilingHP13, author = {Felix C. Freiling and Gerrit Hornung and Radim Polc{\'{a}}k}, title = {Forensic Computing (Dagstuhl Seminar 13482)}, journal = {Dagstuhl Reports}, volume = {3}, number = {11}, pages = {193--208}, year = {2013}, url = {https://doi.org/10.4230/DagRep.3.11.193}, doi = {10.4230/DAGREP.3.11.193}, timestamp = {Wed, 07 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/FreilingHP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/VomelF12, author = {Stefan V{\"{o}}mel and Felix C. Freiling}, title = {Correctness, atomicity, and integrity: Defining criteria for forensically-sound memory acquisition}, journal = {Digit. Investig.}, volume = {9}, number = {2}, pages = {125--137}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.04.005}, doi = {10.1016/J.DIIN.2012.04.005}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/VomelF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BackerDFS12, author = {Matthias B{\"{a}}cker and Andreas Dewald and Felix C. Freiling and Sven Schmitt}, title = {Kriterien f{\"{u}}r die Priorisierung bei der Sicherung und Analyse digitaler Spuren}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {8}, pages = {597--602}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0187-2}, doi = {10.1007/S11623-012-0187-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BackerDFS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/it/WillemsF12, author = {Carsten Willems and Felix C. Freiling}, title = {Reverse Code Engineering - State of the Art and Countermeasures}, journal = {it Inf. Technol.}, volume = {54}, number = {2}, pages = {53--63}, year = {2012}, url = {https://doi.org/10.1524/itit.2012.0664}, doi = {10.1524/ITIT.2012.0664}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/it/WillemsF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CortinasFGLLPA12, author = {Roberto Corti{\~{n}}as and Felix C. Freiling and Marjan Ghajar{-}Azadanlou and Alberto Lafuente and Mikel Larrea and Lucia Draque Penso and Iratxe Soraluze Arriola}, title = {Secure Failure Detection and Consensus in TrustedPals}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {610--625}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.23}, doi = {10.1109/TDSC.2012.23}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CortinasFGLLPA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/MullerTF12, author = {Tilo M{\"{u}}ller and Benjamin Taubmann and Felix C. Freiling}, editor = {Feng Bao and Pierangela Samarati and Jianying Zhou}, title = {TreVisor - OS-Independent Software-Based Full Disk Encryption Secure against Main Memory Attacks}, booktitle = {Applied Cryptography and Network Security - 10th International Conference, {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7341}, pages = {66--83}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31284-7\_5}, doi = {10.1007/978-3-642-31284-7\_5}, timestamp = {Fri, 09 Apr 2021 18:46:11 +0200}, biburl = {https://dblp.org/rec/conf/acns/MullerTF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WillemsFH12, author = {Carsten Willems and Felix C. Freiling and Thorsten Holz}, editor = {Robert H'obbes' Zakon}, title = {Using memory management to detect and extract illegitimate code for malware analysis}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {179--188}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420979}, doi = {10.1145/2420950.2420979}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/WillemsFH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edoc/AtkinsonBGFSHMM12, author = {Colin Atkinson and Florian Barth and Ralph Gerbig and Felix C. Freiling and Sebastian Schinzel and Frank Hadasch and Alexander Maedche and Benjamin M{\"{u}}ller}, title = {Reducing the Incidence of Unintended, Human-Caused Information Flows in Enterprise Systems}, booktitle = {16th {IEEE} International Enterprise Distributed Object Computing Conference Workshops, {EDOC} Workshops, Beijing, China, September 10-14, 2012}, pages = {11--18}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EDOCW.2012.12}, doi = {10.1109/EDOCW.2012.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edoc/AtkinsonBGFSHMM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/SpreitzenbarthSF12, author = {Michael Spreitzenbarth and Sven Schmitt and Felix C. Freiling}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Comparing Sources of Location Data from Android Smartphones}, booktitle = {Advances in Digital Forensics {VIII} - 8th {IFIP} {WG} 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {383}, pages = {143--157}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33962-2\_10}, doi = {10.1007/978-3-642-33962-2\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/SpreitzenbarthSF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/DewaldFSSSVW12, author = {Andreas Dewald and Felix C. Freiling and Thomas Schreck and Michael Spreitzenbarth and Johannes St{\"{u}}ttgen and Stefan V{\"{o}}mel and Carsten Willems}, editor = {Neeraj Suri and Michael Waidner}, title = {Analyse und Vergleich von BckR2D2-I und {II}}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {47--58}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18287}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/DewaldFSSSVW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/ZimmermannSSF12, author = {Christian Zimmermann and Michael Spreitzenbarth and Sven Schmitt and Felix C. Freiling}, editor = {Neeraj Suri and Michael Waidner}, title = {Forensic Analysis of {YAFFS2}}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {59--69}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18263}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/ZimmermannSSF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/EngelberthGSF12, author = {Markus Engelberth and Jan G{\"{o}}bel and Christian Sch{\"{o}}nbein and Felix C. Freiling}, editor = {Neeraj Suri and Michael Waidner}, title = {PyBox - {A} Python Sandbox}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {137--148}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18269}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/EngelberthGSF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/TriniusF12, author = {Philipp Trinius and Felix C. Freiling}, editor = {Neeraj Suri and Michael Waidner}, title = {Filtern von Spam-Nachrichten mit kontextfreien Grammatiken}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {163--174}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18271}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/TriniusF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isw/2012, editor = {Dieter Gollmann and Felix C. Freiling}, title = {Information Security - 15th International Conference, {ISC} 2012, Passau, Germany, September 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7483}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33383-5}, doi = {10.1007/978-3-642-33383-5}, isbn = {978-3-642-33382-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0029558, author = {Andreas Dewald and Felix C. Freiling}, title = {Forensische Informatik}, publisher = {Books on Demand GmbH}, year = {2011}, url = {http://www.bod.de/index.php?id=296\&\#38;objk\_id=572434}, isbn = {978-3-8423-7947-3}, timestamp = {Mon, 07 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/daglib/0029558.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/FreilingGK11, author = {Felix C. Freiling and Rachid Guerraoui and Petr Kuznetsov}, title = {The failure detector abstraction}, journal = {{ACM} Comput. Surv.}, volume = {43}, number = {2}, pages = {9:1--9:40}, year = {2011}, url = {https://doi.org/10.1145/1883612.1883616}, doi = {10.1145/1883612.1883616}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/FreilingGK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/VomelF11, author = {Stefan V{\"{o}}mel and Felix C. Freiling}, title = {A survey of main memory acquisition and analysis techniques for the windows operating system}, journal = {Digit. Investig.}, volume = {8}, number = {1}, pages = {3--22}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.06.002}, doi = {10.1016/J.DIIN.2011.06.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/VomelF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/EngelberthFGGHHTW11, author = {Markus Engelberth and Felix C. Freiling and Jan G{\"{o}}bel and Christian Gorecki and Thorsten Holz and Ralf Hund and Philipp Trinius and Carsten Willems}, title = {Das Internet-Malware-Analyse-System (InMAS) - Ein System zur gro{\ss}fl{\"{a}}chigen Sammlung und Analyse von Schadsoftware im Internet}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {4}, pages = {247--252}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0061-7}, doi = {10.1007/S11623-011-0061-7}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/EngelberthFGGHHTW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/ArriolaCLLF11, author = {Iratxe Soraluze Arriola and Roberto Corti{\~{n}}as and Alberto Lafuente and Mikel Larrea and Felix C. Freiling}, title = {Communication-efficient failure detection and consensus in omission environments}, journal = {Inf. Process. Lett.}, volume = {111}, number = {6}, pages = {262--268}, year = {2011}, url = {https://doi.org/10.1016/j.ipl.2010.12.008}, doi = {10.1016/J.IPL.2010.12.008}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/ArriolaCLLF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/badgers/RossowDBCSFP11, author = {Christian Rossow and Christian J. Dietrich and Herbert Bos and Lorenzo Cavallaro and Maarten van Steen and Felix C. Freiling and Norbert Pohlmann}, editor = {Engin Kirda and Thorsten Holz}, title = {Sandnet: network traffic analysis of malicious software}, booktitle = {Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS@EuroSys 2011, Salzburg, Austria, April 10, 2011}, pages = {78--88}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1978672.1978682}, doi = {10.1145/1978672.1978682}, timestamp = {Fri, 11 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/badgers/RossowDBCSFP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/BenensonDEFMMVS11, author = {Zinaida Benenson and Andreas Dewald and Hans{-}Georg E{\ss}er and Felix C. Freiling and Tilo M{\"{u}}ller and Christian Moch and Stefan V{\"{o}}mel and Sebastian Schinzel and Michael Spreitzenbarth and Ben Stock and Johannes St{\"{u}}ttgen}, title = {Exploring the Landscape of Cybercrime}, booktitle = {First SysSec Workshop 2011, SysSec@DIMVA 2011, Amsterdam, The Netherlands, July 6, 2011}, pages = {71--74}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.ieeecomputersociety.org/10.1109/SysSec.2011.23}, doi = {10.1109/SYSSEC.2011.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dimva/BenensonDEFMMVS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ec2nd/DietrichRFBSP11, author = {Christian J. Dietrich and Christian Rossow and Felix C. Freiling and Herbert Bos and Maarten van Steen and Norbert Pohlmann}, title = {On Botnets That Use {DNS} for Command and Control}, booktitle = {Seventh European Conference on Computer Network Defense, {EC2ND} 2011, Gothenburg, Sweden, September 6-7, 2011}, pages = {9--16}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/EC2ND.2011.16}, doi = {10.1109/EC2ND.2011.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ec2nd/DietrichRFBSP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/KnausSGEF11, author = {Alexander Knaus and Johannes St{\"{u}}ttgen and Jan G{\"{o}}bel and Markus Engelberth and Felix C. Freiling}, editor = {Hans{-}Ulrich Hei{\ss} and Peter Pepper and Holger Schlingloff and J{\"{o}}rg Schneider}, title = {S{\"{a}}uberung eines infizierten Windows-Betriebssystems auf Basis von Malware-Analyse-Berichten}, booktitle = {41. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Informatik schafft Communities, {INFORMATIK} 2011, Berlin, Germany, October 4-7, 2011, Abstract Proceedings}, series = {{LNI}}, volume = {{P-192}}, pages = {114}, publisher = {{GI}}, year = {2011}, url = {https://dl.gi.de/handle/20.500.12116/18838}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gi/KnausSGEF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/JawurekF11, author = {Marek Jawurek and Felix C. Freiling}, editor = {Hans{-}Ulrich Hei{\ss} and Peter Pepper and Holger Schlingloff and J{\"{o}}rg Schneider}, title = {Privacy threat analysis of smart metering}, booktitle = {41. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Informatik schafft Communities, {INFORMATIK} 2011, Berlin, Germany, October 4-7, 2011, Abstract Proceedings}, series = {{LNI}}, volume = {{P-192}}, pages = {318}, publisher = {{GI}}, year = {2011}, url = {https://dl.gi.de/handle/20.500.12116/18665}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gi/JawurekF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/MochF11, author = {Christian Moch and Felix C. Freiling}, editor = {Pavel Gladyshev and Marcus K. Rogers}, title = {Evaluating the Forensic Image Generator Generator}, booktitle = {Digital Forensics and Cyber Crime - Third International {ICST} Conference, {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {88}, pages = {238--252}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35515-8\_20}, doi = {10.1007/978-3-642-35515-8\_20}, timestamp = {Wed, 24 May 2017 08:28:31 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/MochF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imf/DewaldFW11, author = {Andreas Dewald and Felix C. Freiling and Tim Weber}, editor = {Holger Morgenstern and Ralf Ehlert and Sandra Frings and Oliver G{\"{o}}bel and Detlef G{\"{u}}nther and Stefan Kiltz and Jens Nedon and Dirk Schadt}, title = {Design and Implementation of a Documentation Tool for Interactive Commandline Sessions}, booktitle = {Sixth International Conference on {IT} Security Incident Management and {IT} Forensics, {IMF} 2011, Stuttgart, Germany, May 10-12, 2011}, pages = {62--80}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IMF.2011.17}, doi = {10.1109/IMF.2011.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imf/DewaldFW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/FreilingS11, author = {Felix C. Freiling and Sebastian Schinzel}, editor = {Jan Camenisch and Simone Fischer{-}H{\"{u}}bner and Yuko Murayama and Armand Portmann and Carlos Rieder}, title = {Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications}, booktitle = {Future Challenges in Security and Privacy for Academia and Industry - 26th {IFIP} {TC} 11 International Information Security Conference, {SEC} 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {354}, pages = {41--55}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21424-0\_4}, doi = {10.1007/978-3-642-21424-0\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/FreilingS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/AlsbihFS11, author = {Amir Alsbih and Felix C. Freiling and Christian Schindelhauer}, editor = {Jan Camenisch and Simone Fischer{-}H{\"{u}}bner and Yuko Murayama and Armand Portmann and Carlos Rieder}, title = {A Case Study in Practical Security of Cable Networks}, booktitle = {Future Challenges in Security and Privacy for Academia and Industry - 26th {IFIP} {TC} 11 International Information Security Conference, {SEC} 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {354}, pages = {92--103}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21424-0\_8}, doi = {10.1007/978-3-642-21424-0\_8}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/AlsbihFS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BecherFHHUW11, author = {Michael Becher and Felix C. Freiling and Johannes Hoffmann and Thorsten Holz and Sebastian Uellenbeck and Christopher Wolf}, title = {Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices}, booktitle = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May 2011, Berkeley, California, {USA}}, pages = {96--111}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SP.2011.29}, doi = {10.1109/SP.2011.29}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/BecherFHHUW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sss/GoreckiFKH11, author = {Christian Gorecki and Felix C. Freiling and Marc K{\"{u}}hrer and Thorsten Holz}, editor = {Xavier D{\'{e}}fago and Franck Petit and Vincent Villain}, title = {TrumanBox: Improving Dynamic Malware Analysis by Emulating the Internet}, booktitle = {Stabilization, Safety, and Security of Distributed Systems - 13th International Symposium, {SSS} 2011, Grenoble, France, October 10-12, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6976}, pages = {208--222}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24550-3\_17}, doi = {10.1007/978-3-642-24550-3\_17}, timestamp = {Sun, 25 Oct 2020 22:45:03 +0100}, biburl = {https://dblp.org/rec/conf/sss/GoreckiFKH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MullerFD11, author = {Tilo M{\"{u}}ller and Felix C. Freiling and Andreas Dewald}, title = {{TRESOR} Runs Encryption Securely Outside {RAM}}, booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/events/sec11/tech/full\_papers/Muller.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/MullerFD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/FreilingHPP11, author = {Felix C. Freiling and Dirk Heckmann and Radim Polc{\'{a}}k and Joachim Posegga}, title = {Forensic Computing (Dagstuhl Seminar 11401)}, journal = {Dagstuhl Reports}, volume = {1}, number = {10}, pages = {1--13}, year = {2011}, url = {https://doi.org/10.4230/DagRep.1.10.1}, doi = {10.4230/DAGREP.1.10.1}, timestamp = {Wed, 07 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/FreilingHPP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/BestehornBBJBF10, author = {Markus Bestehorn and Zinaida Benenson and Erik Buchmann and Marek Jawurek and Klemens B{\"{o}}hm and Felix C. Freiling}, title = {Query Dissemination in Sensor Networks - Predicting Reachability and Energy Consumption}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {9}, number = {1-2}, pages = {85--107}, year = {2010}, url = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-9-number-1-2/ahswn-9-1-2-p-85-107/}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ahswn/BestehornBBJBF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BackerFS10, author = {Matthias B{\"{a}}cker and Felix C. Freiling and Sven Schmitt}, title = {Selektion vor der Sicherung - Methoden zur effizienten forensischen Sicherung von digitalen Speichermedien}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {2}, pages = {80--85}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0040-4}, doi = {10.1007/S11623-010-0040-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BackerFS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/it/BenensonBF10, author = {Zinaida Benenson and Erik{-}Oliver Bla{\ss} and Felix C. Freiling}, title = {Attacker Models for Wireless Sensor Networks (Angreifermodelle f{\"{u}}r drahtlose Sensornetze)}, journal = {it Inf. Technol.}, volume = {52}, number = {6}, pages = {320--324}, year = {2010}, url = {https://doi.org/10.1524/itit.2010.0609}, doi = {10.1524/ITIT.2010.0609}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/it/BenensonBF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/KrontirisFD10, author = {Ioannis Krontiris and Felix C. Freiling and Tassos Dimitriou}, title = {Location privacy in urban sensing networks: research challenges and directions}, journal = {{IEEE} Wirel. Commun.}, volume = {17}, number = {5}, pages = {30--35}, year = {2010}, url = {https://doi.org/10.1109/MWC.2010.5601955}, doi = {10.1109/MWC.2010.5601955}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wc/KrontirisFD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/MuterGF10, author = {Michael M{\"{u}}ter and Andr{\'{e}} Groll and Felix C. Freiling}, title = {A structured approach to anomaly detection for in-vehicle networks}, booktitle = {Sixth International Conference on Information Assurance and Security, {IAS} 2010, Atlanta, GA, USA, August 23-25, 2010}, pages = {92--98}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ISIAS.2010.5604050}, doi = {10.1109/ISIAS.2010.5604050}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/MuterGF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/MullerDF10, author = {Tilo M{\"{u}}ller and Andreas Dewald and Felix C. Freiling}, editor = {Manuel Costa and Engin Kirda}, title = {{AESSE:} a cold-boot resistant implementation of {AES}}, booktitle = {Proceedings of the Third European Workshop on System Security, {EUROSEC} 2010, Paris, France, April 13, 2010}, pages = {42--47}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1752046.1752053}, doi = {10.1145/1752046.1752053}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosec/MullerDF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/KrontirisF10, author = {Ioannis Krontiris and Felix C. Freiling}, title = {Integrating people-centric sensing with social networks: {A} privacy research agenda}, booktitle = {Eigth Annual {IEEE} International Conference on Pervasive Computing and Communications, PerCom 2010, March 29 - April 2, 2010, Mannheim, Germany, Workshop Proceedings}, pages = {620--623}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/PERCOMW.2010.5470510}, doi = {10.1109/PERCOMW.2010.5470510}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/KrontirisF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/DewaldHF10, author = {Andreas Dewald and Thorsten Holz and Felix C. Freiling}, editor = {Sung Y. Shin and Sascha Ossowski and Michael Schumacher and Mathew J. Palakal and Chih{-}Cheng Hung}, title = {ADSandbox: sandboxing JavaScript to fight malicious websites}, booktitle = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010}, pages = {1859--1864}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1774088.1774482}, doi = {10.1145/1774088.1774482}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/DewaldHF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sicherheit/2010, editor = {Felix C. Freiling}, title = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19974}, isbn = {978-3-88579-264-2}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Freiling09, author = {Felix C. Freiling}, title = {Ein Blick auf IT-Sicherheit aus Angreiferperspektive - Vom Wert offensiver Methoden}, journal = {Datenschutz und Datensicherheit}, volume = {33}, number = {4}, pages = {214--217}, year = {2009}, url = {https://doi.org/10.1007/s11623-009-0053-z}, doi = {10.1007/S11623-009-0053-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Freiling09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LieglMF09, author = {Marion Liegl and Martin Mink and Felix C. Freiling}, title = {Datenschutz in digital-forensischen Lehrveranstaltungen - Sicherer Umgang mit pers{\"{o}}nlichen Daten}, journal = {Datenschutz und Datensicherheit}, volume = {33}, number = {4}, pages = {222--227}, year = {2009}, url = {https://doi.org/10.1007/s11623-009-0055-x}, doi = {10.1007/S11623-009-0055-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/LieglMF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FreilingH09, author = {Felix C. Freiling and Dennis Heinson}, title = {Probleme des Verkehrsdatenbegriffs im Rahmen der Vorratsdatenspeicherung}, journal = {Datenschutz und Datensicherheit}, volume = {33}, number = {9}, pages = {547--552}, year = {2009}, url = {https://doi.org/10.1007/s11623-009-0141-0}, doi = {10.1007/S11623-009-0141-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FreilingH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pik/WilkeBFZ09, author = {Joachim Wilke and Erik{-}Oliver Bla{\ss} and Felix C. Freiling and Martina Zitterbart}, title = {A Framework for Probabilistic, Authentic Aggregation in Wireless Sensor Networks}, journal = {Prax. Inf.verarb. Kommun.}, volume = {32}, number = {2}, pages = {116--126}, year = {2009}, url = {https://doi.org/10.1515/piko.2009.0021}, doi = {10.1515/PIKO.2009.0021}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pik/WilkeBFZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/MittalPF09, author = {Neeraj Mittal and Kuppahalli L. Phaneesh and Felix C. Freiling}, title = {Safe termination detection in an asynchronous distributed system when processes may crash and recover}, journal = {Theor. Comput. Sci.}, volume = {410}, number = {6-7}, pages = {614--628}, year = {2009}, url = {https://doi.org/10.1016/j.tcs.2008.10.011}, doi = {10.1016/J.TCS.2008.10.011}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/MittalPF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HolzEF09, author = {Thorsten Holz and Markus Engelberth and Felix C. Freiling}, editor = {Michael Backes and Peng Ning}, title = {Learning More about the Underground Economy: {A} Case-Study of Keyloggers and Dropzones}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {1--18}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_1}, doi = {10.1007/978-3-642-04444-1\_1}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HolzEF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ewsn/KrontirisBGFD09, author = {Ioannis Krontiris and Zinaida Benenson and Thanassis Giannetsos and Felix C. Freiling and Tassos Dimitriou}, editor = {Utz Roedig and Cormac J. Sreenan}, title = {Cooperative Intrusion Detection in Wireless Sensor Networks}, booktitle = {Wireless Sensor Networks, 6th European Conference, {EWSN} 2009, Cork, Ireland, February 11-13, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5432}, pages = {263--278}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00224-3\_17}, doi = {10.1007/978-3-642-00224-3\_17}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ewsn/KrontirisBGFD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/HolzEF09, author = {Thorsten Holz and Markus Engelberth and Felix C. Freiling}, editor = {Stefan Fischer and Erik Maehle and R{\"{u}}diger Reischuk}, title = {Eine Analyse von 33 Gigabyte gestohlener Keylogger-Daten}, booktitle = {39. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Im Focus das Leben, {INFORMATIK} 2009, L{\"{u}}beck, Germany, September 28 - October 2, 2009, Proceedings}, series = {{LNI}}, volume = {{P-154}}, pages = {193}, publisher = {{GI}}, year = {2009}, url = {https://dl.gi.de/handle/20.500.12116/31136}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gi/HolzEF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/BohmeFGK09, author = {Rainer B{\"{o}}hme and Felix C. Freiling and Thomas Gloe and Matthias Kirchner}, editor = {Stefan Fischer and Erik Maehle and R{\"{u}}diger Reischuk}, title = {Multimedia-Forensik als Teildisziplin der digitalen Forensik}, booktitle = {39. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Im Focus das Leben, {INFORMATIK} 2009, L{\"{u}}beck, Germany, September 28 - October 2, 2009, Proceedings}, series = {{LNI}}, volume = {{P-154}}, pages = {1537--1551}, publisher = {{GI}}, year = {2009}, url = {https://dl.gi.de/handle/20.500.12116/31114}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gi/BohmeFGK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imf/MochF09, author = {Christian Moch and Felix C. Freiling}, editor = {Oliver Goebel and Ralf Ehlert and Sandra Frings and Detlef G{\"{u}}nther and Holger Morgenstern and Dirk Schadt}, title = {The Forensic Image Generator Generator (Forensig2)}, booktitle = {{IMF} 2009, Fifth International Conference on {IT} Security Incident Management and {IT} Forensics, Stuttgart, Germany, 15-17 September 2009}, pages = {78--93}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/IMF.2009.8}, doi = {10.1109/IMF.2009.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imf/MochF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/Delporte-GalletFTFK09, author = {Carole Delporte{-}Gallet and Hugues Fauconnier and Andreas Tielmann and Felix C. Freiling and Mahir Kilic}, title = {Message-efficient omission-tolerant consensus with limited synchrony}, booktitle = {23rd {IEEE} International Symposium on Parallel and Distributed Processing, {IPDPS} 2009, Rome, Italy, May 23-29, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/IPDPS.2009.5160899}, doi = {10.1109/IPDPS.2009.5160899}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/Delporte-GalletFTFK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcf/BohmeFGK09, author = {Rainer B{\"{o}}hme and Felix C. Freiling and Thomas Gloe and Matthias Kirchner}, editor = {Zeno J. M. H. Geradts and Katrin Franke and Cor J. Veenman}, title = {Multimedia Forensics Is Not Computer Forensics}, booktitle = {Computational Forensics, Third International Workshop, {IWCF} 2009, The Hague, The Netherlands, August 13-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5718}, pages = {90--103}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03521-0\_9}, doi = {10.1007/978-3-642-03521-0\_9}, timestamp = {Mon, 05 Feb 2024 20:34:04 +0100}, biburl = {https://dblp.org/rec/conf/iwcf/BohmeFGK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdcat/FreilingLM09, author = {Felix C. Freiling and Christian Lambertz and Mila E. Majster{-}Cederbaum}, title = {Modular Consensus Algorithms for the Crash-Recovery Model}, booktitle = {2009 International Conference on Parallel and Distributed Computing, Applications and Technologies, {PDCAT} 2009, Higashi Hiroshima, Japan, 8-11 December 2009}, pages = {287--292}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/PDCAT.2009.50}, doi = {10.1109/PDCAT.2009.50}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdcat/FreilingLM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HundHF09, author = {Ralf Hund and Thorsten Holz and Felix C. Freiling}, editor = {Fabian Monrose}, title = {Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms}, booktitle = {18th {USENIX} Security Symposium, Montreal, Canada, August 10-14, 2009, Proceedings}, pages = {383--398}, publisher = {{USENIX} Association}, year = {2009}, url = {http://www.usenix.org/events/sec09/tech/full\_papers/hund.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/HundHF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/TriniusHGF09, author = {Philipp Trinius and Thorsten Holz and Jan G{\"{o}}bel and Felix C. Freiling}, editor = {Deborah A. Frincke and Carrie Gates and John R. Goodall and Robert F. Erbacher}, title = {Visual analysis of malware behavior using treemaps and thread graphs}, booktitle = {6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009}, pages = {33--38}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/VIZSEC.2009.5375540}, doi = {10.1109/VIZSEC.2009.5375540}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/TriniusHGF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/MittalFVP08, author = {Neeraj Mittal and Felix C. Freiling and Subbarayan Venkatesan and Lucia Draque Penso}, title = {On termination detection in crash-prone distributed systems with failure detectors}, journal = {J. Parallel Distributed Comput.}, volume = {68}, number = {6}, pages = {855--875}, year = {2008}, url = {https://doi.org/10.1016/j.jpdc.2008.02.001}, doi = {10.1016/J.JPDC.2008.02.001}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/MittalFVP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adhoc-now/BenensonBBFJ08, author = {Zinaida Benenson and Markus Bestehorn and Erik Buchmann and Felix C. Freiling and Marek Jawurek}, editor = {David Coudert and David Simplot{-}Ryl and Ivan Stojmenovic}, title = {Query Dissemination with Predictable Reachability and Energy Usage in Sensor Networks}, booktitle = {Ad-hoc, Mobile and Wireless Networks, 7th International Conference, {ADHOC-NOW} 2008, Sophia-Antipolis, France, September 10-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5198}, pages = {279--292}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85209-4\_22}, doi = {10.1007/978-3-540-85209-4\_22}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/adhoc-now/BenensonBBFJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imf/FreilingHM08, author = {Felix C. Freiling and Thorsten Holz and Martin Mink}, editor = {Oliver G{\"{o}}bel and Sandra Frings and Detlef G{\"{u}}nther and Jens Nedon and Dirk Schadt}, title = {Reconstructing People's Lives: {A} Case Study in Teaching Forensic Computing}, booktitle = {IT-Incidents Management {\&} IT-Forensics - {IMF} 2008, Conference Proceedings, September 23-25, 2008, Mannheim, Germany}, series = {{LNI}}, volume = {{P-140}}, pages = {125--141}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/23588}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imf/FreilingHM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/HolzGRF08, author = {Thorsten Holz and Christian Gorecki and Konrad Rieck and Felix C. Freiling}, title = {Measuring and Detecting Fast-Flux Service Networks}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2008, San Diego, California, USA, 10th February - 13th February 2008}, publisher = {The Internet Society}, year = {2008}, url = {https://www.ndss-symposium.org/ndss2008/measuring-and-detecting-fast-flux-service-networks/}, timestamp = {Mon, 01 Feb 2021 08:42:15 +0100}, biburl = {https://dblp.org/rec/conf/ndss/HolzGRF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/HolzSDBF08, author = {Thorsten Holz and Moritz Steiner and Frederic Dahl and Ernst W. Biersack and Felix C. Freiling}, editor = {Fabian Monrose}, title = {Measurements and Mitigation of Peer-to-Peer-based Botnets: {A} Case Study on Storm Worm}, booktitle = {First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats, {LEET} '08, San Francisco, CA, USA, April 15, 2008, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/leet08/tech/full\_papers/holz/holz.pdf}, timestamp = {Mon, 26 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nsdi/HolzSDBF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/IkinciHF08, author = {Ali Ikinci and Thorsten Holz and Felix C. Freiling}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {407--421}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21494}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/IkinciHF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BecherF08, author = {Michael Becher and Felix C. Freiling}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Towards Dynamic Malware Analysis to Increase Mobile Device Security423}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {423--433}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21495}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BecherF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/FreilingL08, author = {Felix C. Freiling and Jens Liebchen}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Iterative Kompromittierungsgraphverfeinerung als methodische Grundlage f{\"{u}}r Netzwerkpenetrationstests}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {435--447}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21496}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/FreilingL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/FreilingLM08, author = {Felix C. Freiling and Christian Lambertz and Mila E. Majster{-}Cederbaum}, editor = {Gadi Taubenfeld}, title = {Easy Consensus Algorithms for the Crash-Recovery Model}, booktitle = {Distributed Computing, 22nd International Symposium, {DISC} 2008, Arcachon, France, September 22-24, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5218}, pages = {507--508}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87779-0\_39}, doi = {10.1007/978-3-540-87779-0\_39}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wdag/FreilingLM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dagstuhl/2005dm, editor = {Irene Eusgeld and Felix C. Freiling and Ralf H. Reussner}, title = {Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30 - November 1, 2005]}, series = {Lecture Notes in Computer Science}, volume = {4909}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68947-8}, doi = {10.1007/978-3-540-68947-8}, isbn = {978-3-540-68946-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/2005dm.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/WillemsHF07, author = {Carsten Willems and Thorsten Holz and Felix C. Freiling}, title = {Toward Automated Dynamic Malware Analysis Using CWSandbox}, journal = {{IEEE} Secur. Priv.}, volume = {5}, number = {2}, pages = {32--39}, year = {2007}, url = {https://doi.org/10.1109/MSP.2007.45}, doi = {10.1109/MSP.2007.45}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/WillemsHF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europar/FreilingMM07, author = {Felix C. Freiling and Matthias Majuntke and Neeraj Mittal}, editor = {Anne{-}Marie Kermarrec and Luc Boug{\'{e}} and Thierry Priol}, title = {On Detecting Termination in the Crash-Recovery Model}, booktitle = {Euro-Par 2007, Parallel Processing, 13th International Euro-Par Conference, Rennes, France, August 28-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4641}, pages = {629--638}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74466-5\_66}, doi = {10.1007/978-3-540-74466-5\_66}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/europar/FreilingMM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imf/FreilingS07, author = {Felix C. Freiling and Bastian Schwittay}, editor = {Sandra Frings and Oliver G{\"{o}}bel and Detlef G{\"{u}}nther and Hardo Hase and Jens Nedon and Dirk Schadt and Arslan Br{\"{o}}mme}, title = {A Common Process Model for Incident Response and Computer Forensics}, booktitle = {IT-Incidents Management {\&} IT-Forensics - {IMF} 2007, Conference Proceedings, September 11-13, 2007, Stuttgart, Germany}, series = {{LNI}}, volume = {{P-114}}, pages = {19--39}, publisher = {{GI}}, year = {2007}, url = {https://dl.gi.de/handle/20.500.12116/22383}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imf/FreilingS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imf/DaiyaDF07, author = {Harish Daiya and Maximillian Dornseif and Felix C. Freiling}, editor = {Sandra Frings and Oliver G{\"{o}}bel and Detlef G{\"{u}}nther and Hardo Hase and Jens Nedon and Dirk Schadt and Arslan Br{\"{o}}mme}, title = {Testing Forensic Hash Tools on Sparse Files}, booktitle = {IT-Incidents Management {\&} IT-Forensics - {IMF} 2007, Conference Proceedings, September 11-13, 2007, Stuttgart, Germany}, series = {{LNI}}, volume = {{P-114}}, pages = {113--123}, publisher = {{GI}}, year = {2007}, url = {https://dl.gi.de/handle/20.500.12116/22389}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imf/DaiyaDF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imf/FreilingS07a, author = {Felix C. Freiling and Bastian Schwittay}, editor = {Sandra Frings and Oliver G{\"{o}}bel and Detlef G{\"{u}}nther and Hardo Hase and Jens Nedon and Dirk Schadt and Arslan Br{\"{o}}mme}, title = {Towards Reliable Rootkit Detection in Live Response}, booktitle = {IT-Incidents Management {\&} IT-Forensics - {IMF} 2007, Conference Proceedings, September 11-13, 2007, Stuttgart, Germany}, series = {{LNI}}, volume = {{P-114}}, pages = {125--143}, publisher = {{GI}}, year = {2007}, url = {https://dl.gi.de/handle/20.500.12116/22380}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imf/FreilingS07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mdm/BenensonFC07, author = {Zinaida Benenson and Felix C. Freiling and Peter M. Cholewinski}, editor = {Christian Becker and Christian S. Jensen and Jianwen Su and Daniela Nicklas}, title = {Advanced Evasive Data Storage in Sensor Networks}, booktitle = {8th International Conference on Mobile Data Management {(MDM} 2007), Mannheim, Germany, May 7-11, 2007}, pages = {146--151}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/MDM.2007.29}, doi = {10.1109/MDM.2007.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mdm/BenensonFC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sss/CortinasFGLLPA07, author = {Roberto Corti{\~{n}}as and Felix C. Freiling and Marjan Ghajar{-}Azadanlou and Alberto Lafuente and Mikel Larrea and Lucia Draque Penso and Iratxe Soraluze Arriola}, editor = {Toshimitsu Masuzawa and S{\'{e}}bastien Tixeuil}, title = {Secure Failure Detection in TrustedPals}, booktitle = {Stabilization, Safety, and Security of Distributed Systems, 9th International Symposium, {SSS} 2007, Paris, France, November 14-16, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4838}, pages = {173--188}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76627-8\_15}, doi = {10.1007/978-3-540-76627-8\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sss/CortinasFGLLPA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sss/FreilingJ07, author = {Felix C. Freiling and Arshad Jhumka}, editor = {Toshimitsu Masuzawa and S{\'{e}}bastien Tixeuil}, title = {Global Predicate Detection in Distributed Systems with Small Faults}, booktitle = {Stabilization, Safety, and Security of Distributed Systems, 9th International Symposium, {SSS} 2007, Paris, France, November 14-16, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4838}, pages = {296--310}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76627-8\_23}, doi = {10.1007/978-3-540-76627-8\_23}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sss/FreilingJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/Delporte-GalletFFPT07, author = {Carole Delporte{-}Gallet and Hugues Fauconnier and Felix C. Freiling and Lucia Draque Penso and Andreas Tielmann}, editor = {Andrzej Pelc}, title = {From Crash-Stop to Permanent Omission: Automatic Transformation and Weakest Failure Detectors}, booktitle = {Distributed Computing, 21st International Symposium, {DISC} 2007, Lemesos, Cyprus, September 24-26, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4731}, pages = {165--178}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75142-7\_15}, doi = {10.1007/978-3-540-75142-7\_15}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wdag/Delporte-GalletFFPT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dagstuhl/2006P6371, editor = {Christian Cachin and Felix C. Freiling and Jaap{-}Henk Hoepman}, title = {From Security to Dependability, 10.09. - 15.09.2006}, series = {Dagstuhl Seminar Proceedings}, volume = {06371}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2007}, url = {http://drops.dagstuhl.de/portals/06371/}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/2006P6371.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerDVFSRL06, author = {Helmut Reimer and Jana Dittmann and Claus Vielhauer and Felix C. Freiling and Francesca Saglietti and Manfred Reitenspie{\ss} and Andreas Lang}, title = {Veranstaltungsbesprechungen}, journal = {Datenschutz und Datensicherheit}, volume = {30}, number = {4}, pages = {258--259}, year = {2006}, url = {https://doi.org/10.1007/s11623-006-0072-y}, doi = {10.1007/S11623-006-0072-Y}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerDVFSRL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/JhumkaFFS06, author = {Arshad Jhumka and Felix C. Freiling and Christof Fetzer and Neeraj Suri}, title = {An approach to synthesise safe systems}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {1/2}, pages = {62--74}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.010824}, doi = {10.1504/IJSN.2006.010824}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/JhumkaFFS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/FreilingV06, author = {Felix C. Freiling and Hagen V{\"{o}}lzer}, title = {Illustrating the impossibility of crash-tolerant consensus in asynchronous systems}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {40}, number = {2}, pages = {105--109}, year = {2006}, url = {https://doi.org/10.1145/1131322.1131324}, doi = {10.1145/1131322.1131324}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/FreilingV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arcs/BenesonFHKP06, author = {Zinaida Benenson and Felix C. Freiling and Thorsten Holz and Dogan Kesdogan and Lucia Draque Penso}, editor = {Wolfgang Karl and J{\"{u}}rgen Becker and Karl{-}Erwin Gro{\ss}pietsch and Christian Hochberger and Erik Maehle}, title = {Safety, Liveness, and Information Flow: Dependability Revisited}, booktitle = {{ARCS} 2006 - 19th International Conference on Architecture of Computing Systems, Workshops Proceedings, March 16, 2006, Frankfurt am Main, Germany}, series = {{LNI}}, volume = {{P-81}}, pages = {56--65}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/29437}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/arcs/BenesonFHKP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/BenensonFPRW06, author = {Zinaida Benenson and Felix C. Freiling and Birgit Pfitzmann and Christian Rohner and Michael Waidner}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {165--178}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_15}, doi = {10.1007/11964254\_15}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/esas/BenensonFPRW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/FortFPBK06, author = {Milan Fort and Felix C. Freiling and Lucia Draque Penso and Zinaida Benenson and Dogan Kesdogan}, editor = {Dieter Gollmann and Jan Meier and Andrei Sabelfeld}, title = {TrustedPals: Secure Multiparty Computation Implemented with Smart Cards}, booktitle = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4189}, pages = {34--48}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11863908\_3}, doi = {10.1007/11863908\_3}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/FortFPBK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imf/AndersonDFHILM06, author = {Philip Anderson and Maximillian Dornseif and Felix C. Freiling and Thorsten Holz and Alastair Irons and Christopher Laing and Martin Mink}, editor = {Oliver G{\"{o}}bel and Dirk Schadt and Sandra Frings and Hardo Hase and Detlef G{\"{u}}nther and Jens Nedon}, title = {A Comparative Study of Teaching Forensics at a University Degree Level}, booktitle = {IT-Incidents Management {\&} IT-Forensics - {IMF} 2006, Conference Proceedings, October, 18th-19th, 2006, Stuttgart}, series = {{LNI}}, volume = {{P-97}}, pages = {116--127}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/23454}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imf/AndersonDFHILM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/MinkF06, author = {Martin Mink and Felix C. Freiling}, title = {Is attack better than defense?: teaching information security the right way}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {44--48}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231056}, doi = {10.1145/1231047.1231056}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/MinkF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/opodis/MittalPF06, author = {Neeraj Mittal and Kuppahalli L. Phaneesh and Felix C. Freiling}, editor = {Alexander A. Shvartsman}, title = {Safe Termination Detection in an Asynchronous Distributed System When Processes May Crash and Recover}, booktitle = {Principles of Distributed Systems, 10th International Conference, {OPODIS} 2006, Bordeaux, France, December 12-15, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4305}, pages = {126--141}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11945529\_10}, doi = {10.1007/11945529\_10}, timestamp = {Mon, 03 Jan 2022 22:35:20 +0100}, biburl = {https://dblp.org/rec/conf/opodis/MittalPF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/BenensonPFL06, author = {Zinaida Benenson and Lexi Pimenidis and Felix C. Freiling and Stefan Lucks}, title = {Authenticated Query Flooding in Sensor Networks}, booktitle = {4th {IEEE} Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 13-17 March 2006, Pisa, Italy}, pages = {644--647}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/PERCOMW.2006.23}, doi = {10.1109/PERCOMW.2006.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/BenensonPFL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BaecherKHDF06, author = {Paul Baecher and Markus Koetter and Thorsten Holz and Maximillian Dornseif and Felix C. Freiling}, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {The Nepenthes Platform: An Efficient Approach to Collect Malware}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, pages = {165--184}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214\_9}, doi = {10.1007/11856214\_9}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BaecherKHDF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/BenensonFHLP06, author = {Zinaida Benenson and Felix C. Freiling and Ernest Hammerschmidt and Stefan Lucks and Lexi Pimenidis}, editor = {Simone Fischer{-}H{\"{u}}bner and Kai Rannenberg and Louise Yngstr{\"{o}}m and Stefan Lindskog}, title = {Authenticated Query Flooding in Sensor Networks}, booktitle = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP} {TC-11} 21st International Information Security Conference {(SEC} 2006), 22-24 May 2006, Karlstad, Sweden}, series = {{IFIP}}, volume = {201}, pages = {38--49}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/0-387-33406-8\_4}, doi = {10.1007/0-387-33406-8\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/BenensonFHLP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/EsserF06, author = {Hans{-}Georg E{\ss}er and Felix C. Freiling}, editor = {Jana Dittmann}, title = {Kapazit{\"{a}}tsmessung eines verdeckten Zeitkanals {\"{u}}ber {HTTP}}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {115--118}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24763}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/EsserF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/WarnsFH06, author = {Timo Warns and Felix C. Freiling and Wilhelm Hasselbring}, title = {Solving Consensus Using Structural Failure Models}, booktitle = {25th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2006),2-4 October 2006, Leeds, {UK}}, pages = {212--224}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SRDS.2006.44}, doi = {10.1109/SRDS.2006.44}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/WarnsFH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sss/FreilingMM06, author = {Felix C. Freiling and Matthias Majuntke and Neeraj Mittal}, editor = {Ajoy Kumar Datta and Maria Gradinariu}, title = {Brief Announcement: Termination Detection in an Asynchronous Distributed System with Crash-Recovery Failures}, booktitle = {Stabilization, Safety, and Security of Distributed Systems, 8th International Symposium, {SSS} 2006, Dallas, TX, USA, November 17-19, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4280}, pages = {572--573}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-49823-0\_43}, doi = {10.1007/978-3-540-49823-0\_43}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/sss/FreilingMM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/CachinFH06, author = {Christian Cachin and Felix C. Freiling and Jaap{-}Henk Hoepman}, editor = {Christian Cachin and Felix C. Freiling and Jaap{-}Henk Hoepman}, title = {06371 Executive Summary -- From Security to Dependability}, booktitle = {From Security to Dependability, 10.09. - 15.09.2006}, series = {Dagstuhl Seminar Proceedings}, volume = {06371}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2006}, url = {http://drops.dagstuhl.de/opus/volltexte/2007/851}, timestamp = {Thu, 10 Jun 2021 13:02:09 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/CachinFH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/CachinFH06a, author = {Christian Cachin and Felix C. Freiling and Jaap{-}Henk Hoepman}, editor = {Christian Cachin and Felix C. Freiling and Jaap{-}Henk Hoepman}, title = {06371 Abstracts Collection -- From Security to Dependability}, booktitle = {From Security to Dependability, 10.09. - 15.09.2006}, series = {Dagstuhl Seminar Proceedings}, volume = {06371}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2006}, url = {http://drops.dagstuhl.de/opus/volltexte/2007/853}, timestamp = {Thu, 23 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/CachinFH06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/EusgeldF05, author = {Irene Eusgeld and Felix C. Freiling}, editor = {Irene Eusgeld and Felix C. Freiling and Ralf H. Reussner}, title = {Introduction to Dependability Metrics}, booktitle = {Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30 - November 1, 2005]}, series = {Lecture Notes in Computer Science}, volume = {4909}, pages = {1--4}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-68947-8\_1}, doi = {10.1007/978-3-540-68947-8\_1}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/EusgeldF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/BohmeF05, author = {Rainer B{\"{o}}hme and Felix C. Freiling}, editor = {Irene Eusgeld and Felix C. Freiling and Ralf H. Reussner}, title = {On Metrics and Measurements}, booktitle = {Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30 - November 1, 2005]}, series = {Lecture Notes in Computer Science}, volume = {4909}, pages = {7--13}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-68947-8\_2}, doi = {10.1007/978-3-540-68947-8\_2}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/BohmeF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/Freiling05, author = {Felix C. Freiling}, editor = {Irene Eusgeld and Felix C. Freiling and Ralf H. Reussner}, title = {Introduction to Security Metrics}, booktitle = {Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30 - November 1, 2005]}, series = {Lecture Notes in Computer Science}, volume = {4909}, pages = {129--132}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-68947-8\_11}, doi = {10.1007/978-3-540-68947-8\_11}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/Freiling05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/FreilingW05, author = {Felix C. Freiling and Max Walter}, editor = {Irene Eusgeld and Felix C. Freiling and Ralf H. Reussner}, title = {Reliability vs. Security: {A} Subjective Overview}, booktitle = {Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30 - November 1, 2005]}, series = {Lecture Notes in Computer Science}, volume = {4909}, pages = {255--257}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-68947-8\_25}, doi = {10.1007/978-3-540-68947-8\_25}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/FreilingW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edcc/AvoineGGV05, author = {Gildas Avoine and Felix C. G{\"{a}}rtner and Rachid Guerraoui and Marko Vukolic}, editor = {Mario Dal Cin and Mohamed Ka{\^{a}}niche and Andr{\'{a}}s Pataricza}, title = {Gracefully Degrading Fair Exchange with Security Modules}, booktitle = {Dependable Computing - EDCC-5, 5th European Dependable Computing Conference, Budapest, Hungary, April 20-22, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3463}, pages = {55--71}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11408901\_5}, doi = {10.1007/11408901\_5}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/edcc/AvoineGGV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/FreilingHW05, author = {Felix C. Freiling and Thorsten Holz and Georg Wicherski}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {319--335}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_19}, doi = {10.1007/11555827\_19}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/FreilingHW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europar/ShapiroKFR05, author = {Marc Shapiro and Idit Keidar and Felix C. Freiling and Lu{\'{\i}}s E. T. Rodrigues}, editor = {Jos{\'{e}} C. Cunha and Pedro D. Medeiros}, title = {Topic 8 - Distributed Systems and Algorithms}, booktitle = {Euro-Par 2005, Parallel Processing, 11th International Euro-Par Conference, Lisbon, Portugal, August 30 - September 2, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3648}, pages = {593}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11549468\_66}, doi = {10.1007/11549468\_66}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/europar/ShapiroKFR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ewsn/BenensonGK05, author = {Zinaida Benenson and Felix C. G{\"{a}}rtner and Dogan Kesdogan}, title = {An algorithmic framework for robust access control in wireless sensor networks}, booktitle = {Wireless Sensor Networks, Second European Workshop, {EWSN} 2005, Istanbul, Turkey, January 31 - February 2, 2005, Proceedings}, pages = {158--165}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/EWSN.2005.1462007}, doi = {10.1109/EWSN.2005.1462007}, timestamp = {Mon, 01 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ewsn/BenensonGK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/FreilingMP05, author = {Felix C. Freiling and Neeraj Mittal and Lucia Draque Penso}, editor = {Armin B. Cremers and Rainer Manthey and Peter Martini and Volker Steinhage}, title = {Transformations in Secure and Fault-Tolerant Distributed Computation}, booktitle = {35. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Informatik LIVE!, {INFORMATIK} 2005, Bonn, Germany, September 19-22, 2005, Band 1}, series = {{LNI}}, volume = {{P-67}}, pages = {410--412}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28071}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gi/FreilingMP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictac/Delporte-GalletFF05, author = {Carole Delporte{-}Gallet and Hugues Fauconnier and Felix C. Freiling}, editor = {Dang Van Hung and Martin Wirsing}, title = {Revisiting Failure Detection and Consensus in Omission Failure Environments}, booktitle = {Theoretical Aspects of Computing - {ICTAC} 2005, Second International Colloquium, Hanoi, Vietnam, October 17-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3722}, pages = {394--408}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560647\_26}, doi = {10.1007/11560647\_26}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/ictac/Delporte-GalletFF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/opodis/FreilingHP05, author = {Felix C. Freiling and Maurice Herlihy and Lucia Draque Penso}, editor = {James H. Anderson and Giuseppe Prencipe and Roger Wattenhofer}, title = {Optimal Randomized Fair Exchange with Secret Shared Coins}, booktitle = {Principles of Distributed Systems, 9th International Conference, {OPODIS} 2005, Pisa, Italy, December 12-14, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3974}, pages = {61--72}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11795490\_7}, doi = {10.1007/11795490\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/opodis/FreilingHP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdcs/BenensonCF05, author = {Zinaida Benenson and Peter M. Cholewinski and Felix C. Freiling}, editor = {S. Q. Zheng}, title = {Simple Evasive Data Storage in Sensor Networks}, booktitle = {International Conference on Parallel and Distributed Computing Systems, {PDCS} 2005, November 14-16, 2005, Phoenix, AZ, {USA}}, pages = {779--784}, publisher = {{IASTED/ACTA} Press}, year = {2005}, timestamp = {Wed, 09 Nov 2022 13:58:44 +0100}, biburl = {https://dblp.org/rec/conf/pdcs/BenensonCF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BenensonGK05, author = {Zinaida Benenson and Felix C. G{\"{a}}rtner and Dogan Kesdogan}, editor = {Hannes Federrath}, title = {Secure Multi-Party Computation with Security Modules}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {41--52}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28394}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BenensonGK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sss/FreilingG05, author = {Felix C. Freiling and Sukumar Ghosh}, editor = {Ted Herman and S{\'{e}}bastien Tixeuil}, title = {Code Stabilization}, booktitle = {Self-Stabilizing Systems, 7th International Symposium, {SSS} 2005, Barcelona, Spain, October 26-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3764}, pages = {128--139}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11577327\_9}, doi = {10.1007/11577327\_9}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/sss/FreilingG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/MittalFVP05, author = {Neeraj Mittal and Felix C. Freiling and Subbarayan Venkatesan and Lucia Draque Penso}, editor = {Pierre Fraigniaud}, title = {Efficient Reduction for Wait-Free Termination Detection in a Crash-Prone Distributed System}, booktitle = {Distributed Computing, 19th International Conference, {DISC} 2005, Cracow, Poland, September 26-29, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3724}, pages = {93--107}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11561927\_9}, doi = {10.1007/11561927\_9}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wdag/MittalFVP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pik/DornseifGH04, author = {Maximillian Dornseif and Felix C. G{\"{a}}rtner and Thorsten Holz}, title = {Vulnerability Assessment using Honeypots}, journal = {Prax. Inf.verarb. Kommun.}, volume = {27}, number = {4}, pages = {195--201}, year = {2004}, url = {https://doi.org/10.1515/PIKO.2004.195}, doi = {10.1515/PIKO.2004.195}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pik/DornseifGH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/BunseFL04, author = {Christian Bunse and Felix C. Freiling and Nicole L{\'{e}}vy}, editor = {Ralf H. Reussner and Judith A. Stafford and Clemens A. Szyperski}, title = {A Taxonomy on Component-Based Software Engineering Methods}, booktitle = {Architecting Systems with Trustworthy Components, International Seminar, Dagstuhl Castle, Germany, December 12-17, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3938}, pages = {103--119}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11786160\_6}, doi = {10.1007/11786160\_6}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/BunseFL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/FreilingS04, author = {Felix C. Freiling and Thomas Santen}, editor = {Ralf H. Reussner and Judith A. Stafford and Clemens A. Szyperski}, title = {On the Composition of Compositional Reasoning}, booktitle = {Architecting Systems with Trustworthy Components, International Seminar, Dagstuhl Castle, Germany, December 12-17, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3938}, pages = {137--151}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11786160\_8}, doi = {10.1007/11786160\_8}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/FreilingS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/DornseifGH04, author = {Maximillian Dornseif and Felix C. G{\"{a}}rtner and Thorsten Holz}, editor = {Ulrich Flegel and Michael Meier}, title = {Ermittlung von Verwundbarkeiten mit elektronischen K{\"{o}}dern}, booktitle = {Detection of Intrusions and Malware {\&} Vulnerability Assessment, {GI} {SIG} {SIDAR} Workshop, {DIMVA} 2004, Dortmund, Germany, July 6.7, 2004, Proceedings}, series = {{LNI}}, volume = {{P-46}}, pages = {129--141}, publisher = {{GI}}, year = {2004}, url = {https://dl.gi.de/handle/20.500.12116/29211}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/DornseifGH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/formats/GartnerJ04, author = {Felix C. G{\"{a}}rtner and Arshad Jhumka}, editor = {Yassine Lakhnech and Sergio Yovine}, title = {Automating the Addition of Fail-Safe Fault-Tolerance: Beyond Fusion-Closed Specifications}, booktitle = {Formal Techniques, Modelling and Analysis of Timed and Fault-Tolerant Systems, Joint International Conferences on Formal Modelling and Analysis of Timed Systems, {FORMATS} 2004 and Formal Techniques in Real-Time and Fault-Tolerant Systems, {FTRTFT} 2004, Grenoble, France, September 22-24, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3253}, pages = {183--198}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30206-3\_14}, doi = {10.1007/978-3-540-30206-3\_14}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/formats/GartnerJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/BenensonGK04, author = {Zinaida Benenson and Felix C. G{\"{a}}rtner and Dogan Kesdogan}, editor = {Peter Dadam and Manfred Reichert}, title = {User Authentication in Sensor Networks}, booktitle = {34. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Informatik verbindet, {INFORMATIK} 2004, Ulm, Germany, September 20-24, 2004, Band 2}, series = {{LNI}}, volume = {{P-51}}, pages = {385--389}, publisher = {{GI}}, year = {2004}, url = {https://dl.gi.de/handle/20.500.12116/28800}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gi/BenensonGK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/webDyn2004/BuchmannBCFGLMM04, author = {Alejandro P. Buchmann and Christof Bornh{\"{o}}vd and Mariano Cilia and Ludger Fiege and Felix C. G{\"{a}}rtner and Christoph Liebig and Matthias Meixner and Gero M{\"{u}}hl}, editor = {Mark Levene and Alexandra Poulovassilis}, title = {{DREAM:} Distributed Reliable Event-Based Application Management}, booktitle = {Web Dynamics - Adapting to Change in Content, Size, Topology and Use}, pages = {319--352}, publisher = {Springer}, year = {2004}, timestamp = {Mon, 03 Jan 2005 15:12:12 +0100}, biburl = {https://dblp.org/rec/books/sp/webDyn2004/BuchmannBCFGLMM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CR-0406059, author = {Maximillian Dornseif and Felix C. G{\"{a}}rtner and Thorsten Holz}, title = {Ermittlung von Verwundbarkeiten mit elektronischen Koedern}, journal = {CoRR}, volume = {cs.CR/0406059}, year = {2004}, url = {http://arxiv.org/abs/cs/0406059}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-CR-0406059.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/PagniaVG03, author = {Henning Pagnia and Holger Vogt and Felix C. G{\"{a}}rtner}, title = {Fair Exchange}, journal = {Comput. J.}, volume = {46}, number = {1}, pages = {55--75}, year = {2003}, url = {https://doi.org/10.1093/comjnl/46.1.55}, doi = {10.1093/COMJNL/46.1.55}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/PagniaVG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsonline/GartnerBK03, author = {Felix C. G{\"{a}}rtner and Levente Butty{\'{a}}n and Klaus Kursawe}, title = {Dependable Systems: Podsy Workshop Report - From Fault Tolerance to Security and Back}, journal = {{IEEE} Distributed Syst. Online}, volume = {4}, number = {9}, year = {2003}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dsonline/GartnerBK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/it/Gartner03, author = {Felix C. G{\"{a}}rtner}, title = {Beobachten des Internet: Traum und Wirklichkeit (How to observe the Internet)}, journal = {it Inf. Technol.}, volume = {45}, number = {6}, pages = {353--355}, year = {2003}, url = {https://doi.org/10.1524/itit.45.6.353.20504}, doi = {10.1524/ITIT.45.6.353.20504}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/it/Gartner03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/VogtGP03, author = {Holger Vogt and Felix C. G{\"{a}}rtner and Henning Pagnia}, title = {Supporting Fair Exchange in Mobile Environments}, journal = {Mob. Networks Appl.}, volume = {8}, number = {2}, pages = {127--136}, year = {2003}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/VogtGP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/GartnerKB03, author = {Felix C. G{\"{a}}rtner and Klaus Kursawe and Levente Butty{\'{a}}n}, title = {PoDSy 2003: Principles of Dependable Systems}, booktitle = {2003 International Conference on Dependable Systems and Networks {(DSN} 2003), 22-25 June 2003, San Francisco, CA, USA, Proceedings}, pages = {763}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.ieeecomputersociety.org/10.1109/DSN.2003.10002}, doi = {10.1109/DSN.2003.10002}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/GartnerKB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/Gartner03, author = {Felix C. G{\"{a}}rtner}, editor = {R{\"{u}}diger Grimm and Hubert B. Keller and Kai Rannenberg}, title = {Byzantine Failures and Security: Arbitrary is not (always) Random}, booktitle = {33. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Schwerpunkt "Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit", {INFORMATIK} 2003 - Mit Sicherheit Informatik, Frankfurt am Main, Germany, September 29 - October 2, 2003}, series = {{LNI}}, volume = {{P-36}}, pages = {127--138}, publisher = {{GI}}, year = {2003}, url = {https://dl.gi.de/handle/20.500.12116/29565}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gi/Gartner03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/FiegeZGH03, author = {Ludger Fiege and Andreas Zeidler and Felix C. G{\"{a}}rtner and Sidath B. Handurukande}, title = {Dealing with Uncertainty in Mobile Publish/Subscribe Middleware}, booktitle = {International Middleware Conference, Workshop Proceedings, June 16-20, 2003, Rio de Janeiro, Brazil}, pages = {60--67}, publisher = {PUC-Rio}, year = {2003}, timestamp = {Thu, 17 Jul 2003 08:59:54 +0200}, biburl = {https://dblp.org/rec/conf/middleware/FiegeZGH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/FiegeGKZ03, author = {Ludger Fiege and Felix C. G{\"{a}}rtner and Oliver Kasten and Andreas Zeidler}, editor = {Markus Endler and Douglas C. Schmidt}, title = {Supporting Mobility in Content-Based Publish/Subscribe Middleware}, booktitle = {Middleware 2003, {ACM/IFIP/USENIX} International Middleware Conference, Rio de Janeiro, Brazil, June 16-20, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2672}, pages = {103--122}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-44892-6\_6}, doi = {10.1007/3-540-44892-6\_6}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/middleware/FiegeGKZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/BohnGV03, author = {J{\"{u}}rgen Bohn and Felix C. G{\"{a}}rtner and Harald Vogt}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Dependability Issues of Pervasive Computing in a Healthcare Environment}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {53--70}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_8}, doi = {10.1007/978-3-540-39881-3\_8}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spc/BohnGV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sss/GartnerP03, author = {Felix C. G{\"{a}}rtner and Henning Pagnia}, editor = {Shing{-}Tsaan Huang and Ted Herman}, title = {Time-Efficient Self-Stabilizing Algorithms through Hierarchical Structures}, booktitle = {Self-Stabilizing Systems, 6th International Symposium, {SSS} 2003, San Francisco, CA, USA, June 24-25, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2704}, pages = {154--168}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45032-7\_12}, doi = {10.1007/3-540-45032-7\_12}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/sss/GartnerP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ker/FiegeMG02, author = {Ludger Fiege and Gero M{\"{u}}hl and Felix C. G{\"{a}}rtner}, title = {Modular event-based systems}, journal = {Knowl. Eng. Rev.}, volume = {17}, number = {4}, pages = {359--388}, year = {2002}, url = {https://doi.org/10.1017/S0269888903000559}, doi = {10.1017/S0269888903000559}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ker/FiegeMG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fasec/Gartner02, author = {Felix C. G{\"{a}}rtner}, editor = {Ali E. Abdallah and Peter Y. A. Ryan and Steve A. Schneider}, title = {Revisiting Liveness Properties in the Context of Secure Systems}, booktitle = {Formal Aspects of Security, First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2629}, pages = {221--238}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-40981-6\_18}, doi = {10.1007/978-3-540-40981-6\_18}, timestamp = {Wed, 15 Sep 2021 13:43:48 +0200}, biburl = {https://dblp.org/rec/conf/fasec/Gartner02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mascots/MuhlFGB02, author = {Gero M{\"{u}}hl and Ludger Fiege and Felix C. G{\"{a}}rtner and Alejandro P. Buchmann}, title = {Evaluating Advanced Routing Algorithms for Content-Based Publish/Subscribe Systems}, booktitle = {10th International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems {(MASCOTS} 2002), 11-16 October 2002, Fort Worth, Texas, {USA}}, pages = {167--176}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/MASCOT.2002.1167074}, doi = {10.1109/MASCOT.2002.1167074}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mascots/MuhlFGB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/FiegeMG02, author = {Ludger Fiege and Gero M{\"{u}}hl and Felix C. G{\"{a}}rtner}, editor = {Gary B. Lamont and Hisham Haddad and George A. Papadopoulos and Brajendra Panda}, title = {A modular approach to build structured event-based systems}, booktitle = {Proceedings of the 2002 {ACM} Symposium on Applied Computing (SAC), March 10-14, 2002, Madrid, Spain}, pages = {385--392}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/508791.508864}, doi = {10.1145/508791.508864}, timestamp = {Tue, 06 Nov 2018 11:06:47 +0100}, biburl = {https://dblp.org/rec/conf/sac/FiegeMG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/GartnerP02, author = {Felix C. G{\"{a}}rtner and Stefan Pleisch}, editor = {Dahlia Malkhi}, title = {Failure Detection Sequencers: Necessary and Sufficient Information about Failures to Solve Predicate Detection}, booktitle = {Distributed Computing, 16th International Conference, {DISC} 2002, Toulouse, France, October 28-30, 2002 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2508}, pages = {280--294}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36108-1\_19}, doi = {10.1007/3-540-36108-1\_19}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wdag/GartnerP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Freiling01, author = {Felix C. Freiling}, title = {Formale Grundlagen der Fehlertoleranz in verteilten Systemen}, school = {Darmstadt University of Technology, Germany}, year = {2001}, url = {http://elib.tu-darmstadt.de/diss/000162/gaertner.pdf}, urn = {urn:nbn:de:tuda-tuprints-1621}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Freiling01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/welcom/VogtPG01, author = {Holger Vogt and Henning Pagnia and Felix C. G{\"{a}}rtner}, editor = {Ludger Fiege and Gero M{\"{u}}hl and Uwe G. Wilhelm}, title = {Using Smart Cards for Fair Exchange}, booktitle = {Electronic Commerce, Second International Workshop, {WELCOM} 2001 Heidelberg, Germany, November 16-17, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2232}, pages = {101--113}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45598-1\_11}, doi = {10.1007/3-540-45598-1\_11}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/welcom/VogtPG01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wss/GartnerP01, author = {Felix C. G{\"{a}}rtner and Stefan Pleisch}, editor = {Ajoy Kumar Datta and Ted Herman}, title = {(Im)Possibilities of Predicate Detection in Crash-Affected Systems}, booktitle = {Self-Stabilizing Systems, 5th International Workshop, {WSS} 2001, Lisbon, Portugal, October 1-2, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2194}, pages = {98--113}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45438-1\_7}, doi = {10.1007/3-540-45438-1\_7}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/wss/GartnerP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/gi/Gartner01, author = {Felix C. G{\"{a}}rtner}, editor = {Heinz Beilner and Herbert Fiedler and Oliver G{\"{u}}nther and Steffen H{\"{o}}lldobler and G{\"{u}}nter Hotz and Peter Liggesmeyer and Klaus{-}Peter L{\"{o}}hr and R{\"{u}}diger Reischuk and Dorothea Wagner}, title = {Formale Grundlagen der Fehlertoleranz in verteilten Systemen}, booktitle = {Ausgezeichnete Informatikdissertationen 2001}, series = {{LNI}}, volume = {{D-2}}, pages = {39--49}, publisher = {{GI}}, year = {2001}, url = {https://dl.gi.de/handle/20.500.12116/4445}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gi/Gartner01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jetai/MantelG00, author = {Heiko Mantel and Felix C. G{\"{a}}rtner}, title = {A case study in the mechanical verification of fault tolerance}, journal = {J. Exp. Theor. Artif. Intell.}, volume = {12}, number = {4}, pages = {473--487}, year = {2000}, url = {https://doi.org/10.1080/095281300454847}, doi = {10.1080/095281300454847}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jetai/MantelG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/flairs/MantelG00, author = {Heiko Mantel and Felix C. G{\"{a}}rtner}, editor = {James N. Etheredge and Bill Z. Manaris}, title = {A Case Study in the Mechanical Verification of Fault Tolerance}, booktitle = {Proceedings of the Thirteenth International Florida Artificial Intelligence Research Society Conference, May 22-24, 2000, Orlando, Florida, {USA}}, pages = {341--345}, publisher = {{AAAI} Press}, year = {2000}, url = {http://www.aaai.org/Library/FLAIRS/2000/flairs00-064.php}, timestamp = {Wed, 26 Oct 2022 08:35:35 +0200}, biburl = {https://dblp.org/rec/conf/flairs/MantelG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/TheisenG00, author = {Marc Theisen and Felix C. G{\"{a}}rtner}, editor = {Kurt Mehlhorn and Gregor Snelting}, title = {Correctness Preserving Transformations for the Design of Parallelized Low-Power Systems}, booktitle = {Informatik 2000, Neue Horizonte im neuen Jahrhundert 30. Jahrestagung der Gesellschaft f{\"{u}}r Informatik Berlin, 19.-22. September 2000}, series = {Informatik aktuell}, pages = {165--180}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-642-58322-3\_15}, doi = {10.1007/978-3-642-58322-3\_15}, timestamp = {Thu, 27 Jun 2019 11:28:34 +0200}, biburl = {https://dblp.org/rec/conf/gi/TheisenG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ma/PagniaVGW00, author = {Henning Pagnia and Holger Vogt and Felix C. G{\"{a}}rtner and Uwe G. Wilhelm}, editor = {David Kotz and Friedemann Mattern}, title = {Solving Fair Exchange with Mobile Agents}, booktitle = {Agent Systems, Mobile Agents, and Applications, Second International Symposium on Agent Systems and Applications and Fourth International Symposium on Mobile Agents, {ASA/MA} 2000, Z{\"{u}}rich, Switzerland, September 13-15, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1882}, pages = {57--72}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-45347-5\_6}, doi = {10.1007/978-3-540-45347-5\_6}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/ma/PagniaVGW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/GartnerK00, author = {Felix C. G{\"{a}}rtner and Sven Kloppenburg}, title = {Consistent Detection of Global Predicates under a Weak Fault Assumption}, booktitle = {19th {IEEE} Symposium on Reliable Distributed Systems, SRDS'00, N{\"{u}}rnberg, Germany, October 16-18, 2000, Proceedings}, pages = {94--103}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/RELDI.2000.885397}, doi = {10.1109/RELDI.2000.885397}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/GartnerK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/Gartner99, author = {Felix C. G{\"{a}}rtner}, title = {Fundamentals of Fault-Tolerant Distributed Computing in Asynchronous Environments}, journal = {{ACM} Comput. Surv.}, volume = {31}, number = {1}, pages = {1--26}, year = {1999}, url = {https://doi.org/10.1145/311531.311532}, doi = {10.1145/311531.311532}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/Gartner99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/Gartner99, author = {Felix C. G{\"{a}}rtner}, title = {Transformational Approaches to the Specification and Verification of Fault-Tolerant Systems: Formal Background and Classification}, journal = {J. Univers. Comput. Sci.}, volume = {5}, number = {10}, pages = {668--692}, year = {1999}, url = {https://doi.org/10.3217/jucs-005-10-0668}, doi = {10.3217/JUCS-005-10-0668}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jucs/Gartner99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/VogtPG99, author = {Holger Vogt and Henning Pagnia and Felix C. G{\"{a}}rtner}, title = {Modular Fair Exchange Protocols for Electronic Commerce}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {3--11}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816008}, doi = {10.1109/CSAC.1999.816008}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/VogtPG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/GartnerT99, author = {Felix C. G{\"{a}}rtner and Marc Theisen}, editor = {Kurt Beiersd{\"{o}}rfer and Gregor Engels and Wilhelm Sch{\"{a}}fer}, title = {Transformationen zur parallelisierten und fehlertoleranten Informationsverarbeitung}, booktitle = {Informatik '99 - Informatik {\"{u}}berwindet Grenzen, 29. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Paderborn, 5.-9. Oktober 1999}, series = {Informatik Aktuell}, pages = {207--214}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-662-01069-3\_31}, doi = {10.1007/978-3-662-01069-3\_31}, timestamp = {Tue, 23 May 2017 01:10:32 +0200}, biburl = {https://dblp.org/rec/conf/gi/GartnerT99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/GartnerPV99, author = {Felix C. G{\"{a}}rtner and Henning Pagnia and Holger Vogt}, title = {Approaching a Formal Definition of Fairness in Electronic Commerce}, booktitle = {The Eighteenth Symposium on Reliable Distributed Systems, {SRDS} 1999, Lausanne, Switzerland, October 19-22, 1999, Proceedings}, pages = {354--359}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/RELDIS.1999.805123}, doi = {10.1109/RELDIS.1999.805123}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/GartnerPV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wss/TheelG99, author = {Oliver E. Theel and Felix C. G{\"{a}}rtner}, editor = {Anish Arora}, title = {An exercise in proving convergence through transfer functions}, booktitle = {1999 {ICDCS} Workshop on Self-stabilizing Systems, Austin, Texas, USA, June 5, 1999, Proceedings}, pages = {41--47}, publisher = {{IEEE} Computer Society}, year = {1999}, timestamp = {Mon, 18 Jun 2018 20:48:42 +0200}, biburl = {https://dblp.org/rec/conf/wss/TheelG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wss/GartnerP99, author = {Felix C. G{\"{a}}rtner and Henning Pagnia}, editor = {Anish Arora}, title = {Self-stabilizing load distribution for replicated servers on a per-access basis}, booktitle = {1999 {ICDCS} Workshop on Self-stabilizing Systems, Austin, Texas, USA, June 5, 1999, Proceedings}, pages = {102--109}, publisher = {{IEEE} Computer Society}, year = {1999}, timestamp = {Mon, 30 Dec 2002 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wss/GartnerP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/insk/Gartner98, author = {Felix C. G{\"{a}}rtner}, title = {Aller Jahre wieder ... Eine fiktive Leidensgeschichte}, journal = {Inform. Spektrum}, volume = {21}, number = {3}, pages = {161}, year = {1998}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/insk/Gartner98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.