Search

Your search keyword '"Freiling, Felix"' showing total 485 results

Search Constraints

Start Over You searched for: Author "Freiling, Felix" Remove constraint Author: "Freiling, Felix"
485 results on '"Freiling, Felix"'

Search Results

51. Lücken schließen: Der verantwortungsbewusste Umgang mit IT-Sicherheitslücken

52. Stark : Tamperproof Authentication to Resist Keylogging

53. Evaluating the Forensic Image Generator Generator

55. TreVisor : OS-Independent Software-Based Full Disk Encryption Secure against Main Memory Attacks

58. TrumanBox: Improving Dynamic Malware Analysis by Emulating the Internet

59. Reliability vs. Security: A Subjective Overview

60. Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones

61. Multimedia Forensics Is Not Computer Forensics

62. Cooperative Intrusion Detection in Wireless Sensor Networks

63. Query Dissemination with Predictable Reachability and Energy Usage in Sensor Networks

64. On Detecting Termination in the Crash-Recovery Model

65. Global Predicate Detection in Distributed Systems with Small Faults

66. Secure Failure Detection in TrustedPals

67. From Crash-Stop to Permanent Omission: Automatic Transformation and Weakest Failure Detectors

69. Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks

70. Safe Termination Detection in an Asynchronous Distributed System When Processes May Crash and Recover

71. TrustedPals: Secure Multiparty Computation Implemented with Smart Cards

72. The Nepenthes Platform: An Efficient Approach to Collect Malware

73. Optimal Randomized Fair Exchange with Secret Shared Coins

74. A Taxonomy on Component-Based Software Engineering Methods

75. On the Composition of Compositional Reasoning

77. Code Stabilization

78. Efficient Reduction for Wait-Free Termination Detection in a Crash-Prone Distributed System

79. Revisiting Failure Detection and Consensus in Omission Failure Environments

80. Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks

83. Defining Atomicity (and Integrity) for Snapshots of Storage in Forensic Computing

86. Proceedings of the 2022 Joint Workshop of the German Research Training Groups in Computer Science

87. Invasives Rechnen

88. 5.-8. April 2022

89. A Comparison of Cloud Storage Technologies as Sources of Digital Evidence

100. Easy Consensus Algorithms for the Crash-Recovery Model

Catalog

Books, media, physical & digital resources