default search action
Felix C. Freiling
Person information
- affiliation: University of Erlangen-Nuremberg, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j75]Simon Ebbers, Stefan Gense, Mouad Bakkouch, Felix C. Freiling, Sebastian Schinzel:
Grand theft API: A forensic analysis of vehicle cloud data. Forensic Sci. Int. Digit. Investig. 48: 301691 (2024) - [j74]Lisa Marie Dreier, Céline Vanini, Christopher James Hargreaves, Frank Breitinger, Felix C. Freiling:
Beyond timestamps: Integrating implicit timing information into digital forensic timelines. Forensic Sci. Int. Digit. Investig. 49: 301755 (2024) - [j73]Ella Savchenko, Jenny Ottmann, Felix C. Freiling:
In the time loop: Data remanence in main memory of virtual machines. Forensic Sci. Int. Digit. Investig. 49: 301758 (2024) - [j72]Christian Lindenmeier, Andreas Hammer, Jan Gruber, Jonas Röckl, Felix C. Freiling:
Key extraction-based lawful access to encrypted data: Taxonomy and survey. Forensic Sci. Int. Digit. Investig. 50: 301796 (2024) - [j71]Jenny Ottmann, Frank Breitinger, Felix C. Freiling:
An Experimental Assessment of Inconsistencies in Memory Forensics. ACM Trans. Priv. Secur. 27(1): 2:1-2:29 (2024) - [c135]Dennis Eckhardt, Felix C. Freiling, Dominik Herrmann, Stefan Katzenbeisser, Henrich C. Pöhls:
Sicherheit in der Digitalisierung des Alltags: Definition eines ethnografisch-informatischen Forschungsfeldes für die Lösung alltäglicher Sicherheitsprobleme. Sicherheit 2024: 107-118 - [e17]Steffen Wendzel, Christian Wressnegger, Laura Hartmann, Felix C. Freiling, Frederik Armknecht, Lena Reinfelder:
Sicherheit, Schutz und Zuverlässigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024. LNI P-345, Gesellschaft für Informatik e.V. 2024, ISBN 978-3-88579-739-5 [contents] - [e16]Rüdiger Reischuk, Sven Apel, Abraham Bernstein, Maike Buchin, Anna Förster, Felix C. Freiling, Jan Mendling, Gustaf Neumann, Kay Uwe Römer, Björn Scheuermann, Ingo Scholtes, Nicole Schweikardt, Klaus Wehrle:
Ausgezeichnete Informatikdissertationen 2023. LNI D-24, GI 2024 [contents] - [i11]Julian Geus, Jenny Ottmann, Felix C. Freiling:
Systematic Evaluation of Forensic Data Acquisition using Smartphone Local Backup. CoRR abs/2404.12808 (2024) - [i10]Marcel Stachak, Julian Geus, Gaston Pugliese, Felix C. Freiling:
Nyon Unchained: Forensic Analysis of Bosch's eBike Board Computers. CoRR abs/2404.12864 (2024) - 2023
- [j70]Jan Gruber, Christopher James Hargreaves, Felix C. Freiling:
Contamination of digital evidence: Understanding an underexposed risk. Forensic Sci. Int. Digit. Investig. 44(Supplement): 301501 (2023) - [e15]Rüdiger Reischuk, Sven Apel, Abraham Bernstein, Felix C. Freiling, Hans-Peter Lenhof, Gustaf Neumann, Kay Uwe Römer, Björn Scheuermann, Nicole Schweikardt, Klaus Wehrle:
Ausgezeichnete Informatikdissertationen 2022. LNI D-23, GI 2023 [contents] - [i9]Jenny Ottmann, Üsame Cengiz, Frank Breitinger, Felix C. Freiling:
As if Time Had Stopped - Checking Memory Dumps for Quasi-Instantaneous Consistency. CoRR abs/2307.12060 (2023) - 2022
- [j69]Janine Schneider, Linus Düsel, Benedikt Lorch, Julia Drafz, Felix C. Freiling:
Prudent design principles for digital tampering experiments. Digit. Investig. 40(Supplement): 301334 (2022) - [j68]Janine Schneider, Maximilian Eichhorn, Felix C. Freiling:
Ambiguous file system partitions. Digit. Investig. 42(Supplement): 301399 (2022) - [j67]Jan Gruber, Lena L. Voigt, Zinaida Benenson, Felix C. Freiling:
Foundations of cybercriminalistics: From general process models to case-specific concretizations in cybercrime investigations. Digit. Investig. 43(Supplement): 301438 (2022) - [j66]Christoph Einzinger, Christian Rückert, Felix C. Freiling:
Datenminimierung in der Netzwerkforensik. Datenschutz und Datensicherheit 46(3): 149-155 (2022) - [j65]Jan Gruber, Felix C. Freiling:
Fighting Evasive Malware. Datenschutz und Datensicherheit 46(5): 284-290 (2022) - [c134]Tobias Latzo, Andreas Hellmich, Annika Knepper, Lukas Hardi, Tim Phillip Castello-Waldow, Felix C. Freiling, Andreas Attenberger:
Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data. NordSec 2022: 329-345 - [c133]Jan Gruber, Felix C. Freiling:
Fighting Evasive Malware: How to Pass the Reverse Turing Test By Utilizing a VMI-Based Human Interaction Simulator. Sicherheit 2022: 49-64 - [e14]Steffen Hölldobler, Rüdiger Reischuk, Sven Apel, Abraham Bernstein, Felix C. Freiling, Hans-Peter Lenhof, Gustaf Neumann, Kay Uwe Römer, Björn Scheuermann, Nicole Schweikardt, Klaus Wehrle:
Ausgezeichnete Informatikdissertationen 2021. LNI D-22, GI 2022, ISBN 978-3-88579-980-1 [contents] - 2021
- [j64]Florian Menges, Tobias Latzo, Manfred Vielberth, Sabine Sobola, Henrich C. Pöhls, Benjamin Taubmann, Johannes Köstler, Alexander Puchta, Felix C. Freiling, Hans P. Reiser, Günther Pernul:
Towards GDPR-compliant data processing in modern SIEM systems. Comput. Secur. 103: 102165 (2021) - [j63]Fabian Faust, Aurélien Thierry, Tilo Müller, Felix C. Freiling:
Selective Imaging of File System Data on Live Systems. Digit. Investig. 36 Supplement: 301115 (2021) - [j62]Jenny Ottmann, Johannes Pollach, Nicole Scheler, Janine Schneider, Christian Rückert, Felix C. Freiling:
Zur Blackbox-Problematik im Bereich Mobilfunkforensik. Datenschutz und Datensicherheit 45(8): 546-552 (2021) - [c132]Jonas Röckl, Mykolai Protsenko, Monika Huber, Tilo Müller, Felix C. Freiling:
Advanced System Resiliency Based on Virtualization Techniques for IoT Devices. ACSAC 2021: 455-467 - [e13]Steffen Hölldobler, Sven Apel, Abraham Bernstein, Felix C. Freiling, Hans-Peter Lenhof, Gustaf Neumann, Rüdiger Reischuk, Kay Uwe Römer, Björn Scheuermann, Nicole Schweikardt, Myra Spiliopoulou, Sabine Süsstrunk, Klaus Wehrle:
Ausgezeichnete Informatikdissertationen 2020. LNI D-21, GI 2021, ISBN 978-3-88579-775-3 [contents] - 2020
- [j61]Patrick Mullan, Christian Riess, Felix C. Freiling:
Towards Open-Set Forensic Source Grouping on JPEG Header Information. Digit. Investig. 32 Supplement: 300916 (2020) - [j60]Tobias Latzo, Julian Brost, Felix C. Freiling:
BMCLeech: Introducing Stealthy Memory Forensics to BMC. Digit. Investig. 32 Supplement: 300919 (2020) - [j59]Janine Schneider, Julian Wolf, Felix C. Freiling:
Tampering with Digital Evidence is Hard: The Case of Main Memory Images. Digit. Investig. 32 Supplement: 300924 (2020) - [j58]Janine Schneider, Hans-Peter Deifel, Stefan Milius, Felix C. Freiling:
Unifying Metadata-Based Storage Reconstruction and Carving with LAYR. Digit. Investig. 33 Supplement: 301006 (2020) - [c131]Marcel Busch, Florian Nicolai, Fabian Fleischer, Christian Rückert, Christoph Safferling, Felix C. Freiling:
Make Remote Forensic Investigations Forensic Again: Increasing the Evidential Value of Remote Forensic Investigations. ICDF2C 2020: 23-43 - [c130]Ralph Palutke, Simon Ruderich, Matthias Wild, Felix C. Freiling:
HyperLeech: Stealthy System Virtualization with Minimal Target Impact through DMA-Based Hypervisor Injection. RAID 2020: 165-179 - [c129]Tobias Groß, Richard Dirauf, Felix C. Freiling:
Systematic Analysis of Browser History Evidence. SADFE 2020: 1-12 - [c128]Nico Müller, Tilo Müller, Felix C. Freiling:
Urheberrecht ./. Sicherheitsanalyse. Sicherheit 2020: 105-115 - [c127]Philipp Morgner, Christoph Mai, Nicole Koschate-Fischer, Felix C. Freiling, Zinaida Benenson:
Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products. SP 2020: 429-446 - [e12]Steffen Hölldobler, Sven Apel, Abraham Bernstein, Felix C. Freiling, Hans-Peter Lenhof, Gustaf Neumann, Rüdiger Reischuk, Kay Uwe Römer, Björn Scheuermann, Nicole Schweikardt, Myra Spiliopoulou, Sabine Süsstrunk, Klaus Wehrle:
Ausgezeichnete Informatikdissertationen 2019. LNI D-20, GI 2020, ISBN 978-3-88579-775-3 [contents] - [i8]Fabian Faust, Aurélien Thierry, Tilo Müller, Felix C. Freiling:
Technical Report: Selective Imaging of File System Data on Live Systems. CoRR abs/2012.02573 (2020)
2010 – 2019
- 2019
- [j57]Tobias Latzo, Ralph Palutke, Felix C. Freiling:
A universal taxonomy and survey of forensic memory acquisition techniques. Digit. Investig. 28(Supplement): 56-69 (2019) - [j56]Patrick Mullan, Christian Riess, Felix C. Freiling:
Forensic source identification using JPEG image headers: The case of smartphones. Digit. Investig. 28 Supplement: S68-S76 (2019) - [j55]Jan Schiller, Felix C. Freiling, Zinaida Benenson, Werner Massonne:
Berufsbegleitendes Studieren an Universitäten - Ein Zukunftsfeld für die IT-Sicherheit. Inform. Spektrum 42(1): 38-47 (2019) - [j54]Pieter Maene, Johannes Götzfried, Tilo Müller, Ruan de Clercq, Felix C. Freiling, Ingrid Verbauwhede:
Atlas: Application Confidentiality in Compromised Embedded Systems. IEEE Trans. Dependable Secur. Comput. 16(3): 415-423 (2019) - [c126]Stefan Schorradt, Edita Bajramovic, Felix C. Freiling:
On the Feasibility of Secure Logging for Industrial Control Systems Using Blockchain. CECC 2019: 4:1-4:6 - [c125]Lamya Abdullah, Sebastian Hahn, Felix C. Freiling:
Achieving Consistency of Software Updates against Strong Attackers. CECC 2019: 6:1-6:6 - [c124]Tobias Latzo, Felix C. Freiling:
Characterizing the Limitations of Forensic Event Reconstruction Based on Log Files. TrustCom/BigDataSE 2019: 466-475 - [e11]Sven Apel, Abraham Bernstein, Felix C. Freiling, Steffen Hölldobler, Hans-Peter Lenhof, Paul Molitor, Gustaf Neumann, Rüdiger Reischuk, Björn Scheuermann, Nicole Schweikardt, Myra Spiliopoulou, Sabine Süsstrunk, Klaus Wehrle:
Ausgezeichnete Informatikdissertationen 2018. LNI D-19, GI 2019, ISBN 978-3-88579-977-1 [contents] - [i7]Lamya Abdullah, Felix C. Freiling, Juan Quintero, Zinaida Benenson:
Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing. CoRR abs/1906.07841 (2019) - [i6]Philipp Morgner, Christoph Mai, Nicole Koschate-Fischer, Felix C. Freiling, Zinaida Benenson:
Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products. CoRR abs/1906.11094 (2019) - 2018
- [j53]Sebastian Nemetz, Sven Schmitt, Felix C. Freiling:
A standardized corpus for SQLite database forensics. Digit. Investig. 24 Supplement: S121-S130 (2018) - [j52]Ralph Palutke, Felix C. Freiling:
Styx: Countering robust memory acquisition. Digit. Investig. 24 Supplement: S18-S28 (2018) - [j51]Felix C. Freiling, Leonhard Hösch:
Controlled experiments in digital evidence tampering. Digit. Investig. 24 Supplement: S83-S92 (2018) - [j50]Felix C. Freiling, Tobias Groß, Tobias Latzo, Tilo Müller, Ralph Palutke:
Advances in Forensic Data Acquisition. IEEE Des. Test 35(5): 63-74 (2018) - [j49]Pieter Maene, Johannes Götzfried, Ruan de Clercq, Tilo Müller, Felix C. Freiling, Ingrid Verbauwhede:
Hardware-Based Trusted Computing Architectures for Isolation and Attestation. IEEE Trans. Computers 67(3): 361-374 (2018) - [c123]Lamya Abdullah, Felix C. Freiling, Juan Quintero, Zinaida Benenson:
Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing. CyberICPS/SECPRE@ESORICS 2018: 137-152 - [c122]Norman Hänsch, Andrea Schankin, Mykolai Protsenko, Felix C. Freiling, Zinaida Benenson:
Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently. SOUPS @ USENIX Security Symposium 2018: 341-356 - [c121]Philipp Morgner, Felix C. Freiling, Zinaida Benenson:
Opinion: Security Lifetime Labels - Overcoming Information Asymmetry in Security of IoT Consumer Products. WISEC 2018: 208-211 - [e10]Sven Apel, Abraham Bernstein, Wolfgang Effelsberg, Felix C. Freiling, Steffen Hölldobler, Hans-Peter Lenhof, Paul Molitor, Gustaf Neumann, Rüdiger Reischuk, Nicole Schweikardt, Björn Scheuermann, Myra Spiliopoulou, Sabine Süsstrunk:
Ausgezeichnete Informatikdissertationen 2017. LNI D-18, GI 2018, ISBN 978-3-88579-977-1 [contents] - 2017
- [j48]Felix C. Freiling, Thomas Glanzmann, Hans P. Reiser:
Characterizing loss of digital evidence due to abstraction layers. Digit. Investig. 20 Supplement: S107-S115 (2017) - [j47]Felix C. Freiling, Christian Zoubek:
Do digital investigators have to program? A controlled experiment in digital investigation. Digit. Investig. 20 Supplement: S37-S46 (2017) - [j46]Job Noorman, Jo Van Bulck, Jan Tobias Mühlberg, Frank Piessens, Pieter Maene, Bart Preneel, Ingrid Verbauwhede, Johannes Götzfried, Tilo Müller, Felix C. Freiling:
Sancus 2.0: A Low-Cost Security Architecture for IoT Devices. ACM Trans. Priv. Secur. 20(3): 7:1-7:33 (2017) - [e9]Abraham Bernstein, Wolfgang Effelsberg, Felix C. Freiling, Steffen Hölldobler, Hans-Peter Lenhof, Paul Molitor, Gustaf Neumann, Rüdiger Reischuk, Nicole Schweikardt, Myra Spiliopoulou, Sabine Süsstrunk:
Ausgezeichnete Informatikdissertationen 2016. LNI D-17, GI 2017, ISBN 978-3-88579-976-4 [contents] - 2016
- [j45]Michael Gruhn, Felix C. Freiling:
Evaluating atomicity, and integrity of correct memory acquisition methods. Digit. Investig. 16 Supplement: S1-S10 (2016) - [j44]Johannes Bauer, Michael Gruhn, Felix C. Freiling:
Lest we forget: Cold-boot attacks on scrambled DDR3 memory. Digit. Investig. 16 Supplement: S65-S74 (2016) - [j43]Benjamin Stritter, Felix C. Freiling, Hartmut König, René Rietz, Steffen Ullrich, Alexander von Gernler, Felix Erlacher, Falko Dressler:
Cleaning up Web 2.0's Security Mess-at Least Partly. IEEE Secur. Priv. 14(2): 48-57 (2016) - [j42]Felix C. Freiling:
Staatliche Spähsoftware zur Strafverfolgung - Zur Verhältnismäßigkeit einer umstrittenen Maßnahme. Inform. Spektrum 39(3): 203-209 (2016) - [j41]Gabor Drescher, Christoph Erhardt, Felix C. Freiling, Johannes Götzfried, Daniel Lohmann, Pieter Maene, Tilo Müller, Ingrid Verbauwhede, Andreas Weichslgartner, Stefan Wildermann:
Providing security on demand using invasive computing. it Inf. Technol. 58(6): 281-295 (2016) - [j40]Andreas Kurtz, Hugo Gascon, Tobias Becker, Konrad Rieck, Felix C. Freiling:
Fingerprinting Mobile Devices Using Personalized Configurations. Proc. Priv. Enhancing Technol. 2016(1): 4-19 (2016) - [c120]Johannes Bauer, Felix C. Freiling:
Towards Cycle-Accurate Emulation of Cortex-M Code to Detect Timing Side Channels. ARES 2016: 49-58 - [c119]Johannes Bauer, Sebastian Schinzel, Felix C. Freiling, Andreas Dewald:
Information leakage behind the curtain: Abusing anti-EMI features for covert communication. HOST 2016: 130-134 - [c118]Andreas Weichslgartner, Stefan Wildermann, Johannes Götzfried, Felix C. Freiling, Michael Glaß, Jürgen Teich:
Design-Time/Run-Time Mapping of Security-Critical Applications in Heterogeneous MPSoCs. SCOPES 2016: 153-162 - [e8]Abraham Bernstein, Wolfgang Effelsberg, Felix C. Freiling, Steffen Hölldobler, Hans-Peter Lenhof, Paul Molitor, Gustaf Neumann, Rüdiger Reischuk, Nicole Schweikardt, Myra Spiliopoulou, Harald Störrle, Sabine Süsstrunk:
Ausgezeichnete Informatikdissertationen 2015. LNI D-16, GI 2016, ISBN 978-3-88579-975-7 [contents] - 2015
- [j39]Maxim Anikeev, Felix C. Freiling, Johannes Götzfried, Tilo Müller:
Secure garbage collection: Preventing malicious data harvesting from deallocated Java objects inside the Dalvik VM. J. Inf. Secur. Appl. 22: 81-86 (2015) - [j38]Felix C. Freiling:
From IT forensics to forensic computing. it Inf. Technol. 57(6): 337-338 (2015) - [j37]Felix C. Freiling, Jan C. Schuhr, Michael Gruhn:
What is essential data in digital forensic analysis? it Inf. Technol. 57(6): 376-383 (2015) - [j36]Tilo Müller, Felix C. Freiling:
A Systematic Assessment of the Security of Full Disk Encryption. IEEE Trans. Dependable Secur. Comput. 12(5): 491-503 (2015) - [c117]Johannes Götzfried, Tilo Müller, Ruan de Clercq, Pieter Maene, Felix C. Freiling, Ingrid Verbauwhede:
Soteria: Offline Software Protection within Low-cost Embedded Devices. ACSAC 2015: 241-250 - [c116]Felix C. Freiling, Michael Gruhn:
What is Essential Data in Digital Forensic Analysis? IMF 2015: 40-48 - [e7]Abraham Bernstein, Wolfgang Effelsberg, Felix C. Freiling, Steffen Hölldobler, Hans-Peter Lenhof, Paul Molitor, Gustaf Neumann, Rüdiger Reischuk, Nicole Schweikardt, Myra Spiliopoulou, Harald Störrle, Sabine Süsstrunk:
Ausgezeichnete Informatikdissertationen 2014. LNI D-15, GI 2015, ISBN 978-3-88579-419-6 [contents] - 2014
- [j35]Felix C. Freiling, Konstantin Sack:
Selektive Datensicherungen in der IT-Forensik. Datenschutz und Datensicherheit 38(2): 112-117 (2014) - [j34]Felix C. Freiling, Rüdiger Grimm, Karl-Erwin Großpietsch, Hubert B. Keller, Jürgen Mottok, Isabel Münch, Kai Rannenberg, Francesca Saglietti:
Technische Sicherheit und Informationssicherheit - Unterschiede und Gemeinsamkeiten. Inform. Spektrum 37(1): 14-24 (2014) - [c115]Yan Zhuang, Mykola Protsenko, Tilo Müller, Felix C. Freiling:
An(other) Exercise in Measuring the Strength of Source Code Obfuscation. DEXA Workshops 2014: 313-317 - [c114]Felix C. Freiling, Mykola Protsenko, Yan Zhuang:
An Empirical Evaluation of Software Obfuscation Techniques Applied to Android APKs. SecureComm (2) 2014: 315-328 - [c113]Andreas Kurtz, Markus Troßbach, Felix C. Freiling:
Snoop-it: Dynamische Analyse und Manipulation von Apple iOS Apps. Sicherheit 2014: 13-23 - [c112]Nadina Hintz, Markus Engelberth, Zinaida Benenson, Felix C. Freiling:
Phishing still works: Erfahrungen und Lehren aus der Durchführung von Phishing-Experimenten. Sicherheit 2014: 37-51 - [c111]Dominik Brodowski, Andreas Dewald, Felix C. Freiling, Steve Kovács, Martin Rieger:
Drei Jahre Master Online Digitale Forensik: Ergebnisse und Erfahrungen. Sicherheit 2014: 391-405 - [e6]Felix C. Freiling, Holger Morgenstern, Sandra Frings, Oliver Göbel, Detlef Günther, Jens Nedon, Dirk Schadt:
Eighth International Conference on IT Security Incident Management & IT Forensics, IMF 2014, Münster, Germany, May 12-14, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-4330-2 [contents] - 2013
- [j33]Felix C. Freiling:
Im Fokus: Technische und menschliche Aspekte von Cyberkriminalität. Prax. Inf.verarb. Kommun. 36(3): 199-200 (2013) - [c110]Tilo Müller, Hans Spath, Richard Mäckl, Felix C. Freiling:
Stark - Tamperproof Authentication to Resist Keylogging. Financial Cryptography 2013: 295-312 - [c109]Johannes Stüttgen, Andreas Dewald, Felix C. Freiling:
Selective Imaging Revisited. IMF 2013: 45-58 - [c108]Martin Wundram, Felix C. Freiling, Christian Moch:
Anti-forensics: The Next Step in Digital Forensics Tool Testing. IMF 2013: 83-97 - [c107]Sven Kälber, Andreas Dewald, Felix C. Freiling:
Forensic Application-Fingerprinting Based on File System Metadata. IMF 2013: 98-112 - [c106]Viviane Zwanger, Felix C. Freiling:
Kernel mode API spectroscopy for incident response and digital forensics. PPREW@POPL 2013: 3:1-3:11 - [c105]Michael Spreitzenbarth, Felix C. Freiling, Florian Echtler, Thomas Schreck, Johannes Hoffmann:
Mobile-sandbox: having a deeper look into android applications. SAC 2013: 1808-1815 - [c104]Maxim Anikeev, Felix C. Freiling:
Preventing malicious data harvesting from deallocated memory areas. SIN 2013: 448-449 - [p3]Andreas Dewald, Felix C. Freiling, Sven Schmitt, Michael Spreitzenbarth, Stefan Vömel:
Systematische Probleme und Grenzen der forensischen Informatik. Jenseits von 1984 2013: 101-118 - [e5]Holger Morgenstern, Ralf Ehlert, Felix C. Freiling, Sandra Frings, Oliver Göbel, Detlef Günther, Stefan Kiltz, Jens Nedon, Dirk Schadt:
Seventh International Conference on IT Security Incident Management and IT Forensics, IMF 2013, Nuremberg, Germany, March 12-14, 2013. IEEE Computer Society 2013, ISBN 978-1-4673-6307-5 [contents] - [i5]Felix C. Freiling, Gerrit Hornung, Radim Polcák:
Forensic Computing (Dagstuhl Seminar 13482). Dagstuhl Reports 3(11): 193-208 (2013) - 2012
- [j32]Stefan Vömel, Felix C. Freiling:
Correctness, atomicity, and integrity: Defining criteria for forensically-sound memory acquisition. Digit. Investig. 9(2): 125-137 (2012) - [j31]Matthias Bäcker, Andreas Dewald, Felix C. Freiling, Sven Schmitt:
Kriterien für die Priorisierung bei der Sicherung und Analyse digitaler Spuren. Datenschutz und Datensicherheit 36(8): 597-602 (2012) - [j30]Carsten Willems, Felix C. Freiling:
Reverse Code Engineering - State of the Art and Countermeasures. it Inf. Technol. 54(2): 53-63 (2012) - [j29]Roberto Cortiñas, Felix C. Freiling, Marjan Ghajar-Azadanlou, Alberto Lafuente, Mikel Larrea, Lucia Draque Penso, Iratxe Soraluze Arriola:
Secure Failure Detection and Consensus in TrustedPals. IEEE Trans. Dependable Secur. Comput. 9(4): 610-625 (2012) - [c103]Tilo Müller, Benjamin Taubmann, Felix C. Freiling:
TreVisor - OS-Independent Software-Based Full Disk Encryption Secure against Main Memory Attacks. ACNS 2012: 66-83 - [c102]Carsten Willems, Felix C. Freiling, Thorsten Holz:
Using memory management to detect and extract illegitimate code for malware analysis. ACSAC 2012: 179-188 - [c101]Colin Atkinson, Florian Barth, Ralph Gerbig, Felix C. Freiling, Sebastian Schinzel, Frank Hadasch, Alexander Maedche, Benjamin Müller:
Reducing the Incidence of Unintended, Human-Caused Information Flows in Enterprise Systems. EDOC Workshops 2012: 11-18 - [c100]Michael Spreitzenbarth, Sven Schmitt, Felix C. Freiling:
Comparing Sources of Location Data from Android Smartphones. IFIP Int. Conf. Digital Forensics 2012: 143-157 - [c99]Andreas Dewald, Felix C. Freiling, Thomas Schreck, Michael Spreitzenbarth, Johannes Stüttgen, Stefan Vömel, Carsten Willems:
Analyse und Vergleich von BckR2D2-I und II. Sicherheit 2012: 47-58 - [c98]Christian Zimmermann, Michael Spreitzenbarth, Sven Schmitt, Felix C. Freiling:
Forensic Analysis of YAFFS2. Sicherheit 2012: 59-69 - [c97]Markus Engelberth, Jan Göbel, Christian Schönbein, Felix C. Freiling:
PyBox - A Python Sandbox. Sicherheit 2012: 137-148 - [c96]Philipp Trinius, Felix C. Freiling:
Filtern von Spam-Nachrichten mit kontextfreien Grammatiken. Sicherheit 2012: 163-174 - [e4]Dieter Gollmann, Felix C. Freiling:
Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings. Lecture Notes in Computer Science 7483, Springer 2012, ISBN 978-3-642-33382-8 [contents] - 2011
- [b2]Andreas Dewald, Felix C. Freiling:
Forensische Informatik. Books on Demand GmbH 2011, ISBN 978-3-8423-7947-3, pp. I-VIII, 1-123 - [j28]Felix C. Freiling, Rachid Guerraoui, Petr Kuznetsov:
The failure detector abstraction. ACM Comput. Surv. 43(2): 9:1-9:40 (2011) - [j27]Stefan Vömel, Felix C. Freiling:
A survey of main memory acquisition and analysis techniques for the windows operating system. Digit. Investig. 8(1): 3-22 (2011) - [j26]Markus Engelberth, Felix C. Freiling, Jan Göbel, Christian Gorecki, Thorsten Holz, Ralf Hund, Philipp Trinius, Carsten Willems:
Das Internet-Malware-Analyse-System (InMAS) - Ein System zur großflächigen Sammlung und Analyse von Schadsoftware im Internet. Datenschutz und Datensicherheit 35(4): 247-252 (2011) - [j25]Iratxe Soraluze Arriola, Roberto Cortiñas, Alberto Lafuente, Mikel Larrea, Felix C. Freiling:
Communication-efficient failure detection and consensus in omission environments. Inf. Process. Lett. 111(6): 262-268 (2011) - [c95]Christian Rossow, Christian J. Dietrich, Herbert Bos, Lorenzo Cavallaro, Maarten van Steen, Felix C. Freiling, Norbert Pohlmann:
Sandnet: network traffic analysis of malicious software. BADGERS@EuroSys 2011: 78-88 - [c94]Zinaida Benenson, Andreas Dewald, Hans-Georg Eßer, Felix C. Freiling, Tilo Müller, Christian Moch, Stefan Vömel, Sebastian Schinzel, Michael Spreitzenbarth, Ben Stock, Johannes Stüttgen:
Exploring the Landscape of Cybercrime. SysSec@DIMVA 2011: 71-74 - [c93]Christian J. Dietrich, Christian Rossow, Felix C. Freiling, Herbert Bos, Maarten van Steen, Norbert Pohlmann:
On Botnets That Use DNS for Command and Control. EC2ND 2011: 9-16 - [c92]Alexander Knaus, Johannes Stüttgen, Jan Göbel, Markus Engelberth, Felix C. Freiling:
Säuberung eines infizierten Windows-Betriebssystems auf Basis von Malware-Analyse-Berichten. GI-Jahrestagung 2011: 114 - [c91]Marek Jawurek, Felix C. Freiling:
Privacy threat analysis of smart metering. GI-Jahrestagung 2011: 318 - [c90]Christian Moch, Felix C. Freiling:
Evaluating the Forensic Image Generator Generator. ICDF2C 2011: 238-252 - [c89]Andreas Dewald, Felix C. Freiling, Tim Weber:
Design and Implementation of a Documentation Tool for Interactive Commandline Sessions. IMF 2011: 62-80 - [c88]Felix C. Freiling, Sebastian Schinzel:
Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications. SEC 2011: 41-55 - [c87]Amir Alsbih, Felix C. Freiling, Christian Schindelhauer:
A Case Study in Practical Security of Cable Networks. SEC 2011: 92-103 - [c86]Michael Becher, Felix C. Freiling, Johannes Hoffmann, Thorsten Holz, Sebastian Uellenbeck, Christopher Wolf:
Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices. IEEE Symposium on Security and Privacy 2011: 96-111 - [c85]Christian Gorecki, Felix C. Freiling, Marc Kührer, Thorsten Holz:
TrumanBox: Improving Dynamic Malware Analysis by Emulating the Internet. SSS 2011: 208-222 - [c84]Tilo Müller, Felix C. Freiling, Andreas Dewald:
TRESOR Runs Encryption Securely Outside RAM. USENIX Security Symposium 2011 - [i4]Felix C. Freiling, Dirk Heckmann, Radim Polcák, Joachim Posegga:
Forensic Computing (Dagstuhl Seminar 11401). Dagstuhl Reports 1(10): 1-13 (2011) - 2010
- [j24]Markus Bestehorn, Zinaida Benenson, Erik Buchmann, Marek Jawurek, Klemens Böhm, Felix C. Freiling:
Query Dissemination in Sensor Networks - Predicting Reachability and Energy Consumption. Ad Hoc Sens. Wirel. Networks 9(1-2): 85-107 (2010) - [j23]Matthias Bäcker, Felix C. Freiling, Sven Schmitt:
Selektion vor der Sicherung - Methoden zur effizienten forensischen Sicherung von digitalen Speichermedien. Datenschutz und Datensicherheit 34(2): 80-85 (2010) - [j22]Zinaida Benenson, Erik-Oliver Blaß, Felix C. Freiling:
Attacker Models for Wireless Sensor Networks (Angreifermodelle für drahtlose Sensornetze). it Inf. Technol. 52(6): 320-324 (2010) - [j21]Ioannis Krontiris, Felix C. Freiling, Tassos Dimitriou:
Location privacy in urban sensing networks: research challenges and directions. IEEE Wirel. Commun. 17(5): 30-35 (2010) - [c83]Michael Müter, André Groll, Felix C. Freiling:
A structured approach to anomaly detection for in-vehicle networks. IAS 2010: 92-98 - [c82]Tilo Müller, Andreas Dewald, Felix C. Freiling:
AESSE: a cold-boot resistant implementation of AES. EUROSEC 2010: 42-47 - [c81]Ioannis Krontiris, Felix C. Freiling:
Integrating people-centric sensing with social networks: A privacy research agenda. PerCom Workshops 2010: 620-623 - [c80]Andreas Dewald, Thorsten Holz, Felix C. Freiling:
ADSandbox: sandboxing JavaScript to fight malicious websites. SAC 2010: 1859-1864 - [e3]Felix C. Freiling:
Sicherheit 2010: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin. LNI P-170, GI 2010, ISBN 978-3-88579-264-2 [contents]
2000 – 2009
- 2009
- [j20]Felix C. Freiling:
Ein Blick auf IT-Sicherheit aus Angreiferperspektive - Vom Wert offensiver Methoden. Datenschutz und Datensicherheit 33(4): 214-217 (2009) - [j19]Marion Liegl, Martin Mink, Felix C. Freiling:
Datenschutz in digital-forensischen Lehrveranstaltungen - Sicherer Umgang mit persönlichen Daten. Datenschutz und Datensicherheit 33(4): 222-227 (2009) - [j18]Felix C. Freiling, Dennis Heinson:
Probleme des Verkehrsdatenbegriffs im Rahmen der Vorratsdatenspeicherung. Datenschutz und Datensicherheit 33(9): 547-552 (2009) - [j17]Joachim Wilke, Erik-Oliver Blaß, Felix C. Freiling, Martina Zitterbart:
A Framework for Probabilistic, Authentic Aggregation in Wireless Sensor Networks. Prax. Inf.verarb. Kommun. 32(2): 116-126 (2009) - [j16]Neeraj Mittal, Kuppahalli L. Phaneesh, Felix C. Freiling:
Safe termination detection in an asynchronous distributed system when processes may crash and recover. Theor. Comput. Sci. 410(6-7): 614-628 (2009) - [c79]Thorsten Holz, Markus Engelberth, Felix C. Freiling:
Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones. ESORICS 2009: 1-18 - [c78]Ioannis Krontiris, Zinaida Benenson, Thanassis Giannetsos, Felix C. Freiling, Tassos Dimitriou:
Cooperative Intrusion Detection in Wireless Sensor Networks. EWSN 2009: 263-278 - [c77]Thorsten Holz, Markus Engelberth, Felix C. Freiling:
Eine Analyse von 33 Gigabyte gestohlener Keylogger-Daten. GI Jahrestagung 2009: 193 - [c76]Rainer Böhme, Felix C. Freiling, Thomas Gloe, Matthias Kirchner:
Multimedia-Forensik als Teildisziplin der digitalen Forensik. GI Jahrestagung 2009: 1537-1551 - [c75]Christian Moch, Felix C. Freiling:
The Forensic Image Generator Generator (Forensig2). IMF 2009: 78-93 - [c74]Carole Delporte-Gallet, Hugues Fauconnier, Andreas Tielmann, Felix C. Freiling, Mahir Kilic:
Message-efficient omission-tolerant consensus with limited synchrony. IPDPS 2009: 1-8 - [c73]Rainer Böhme, Felix C. Freiling, Thomas Gloe, Matthias Kirchner:
Multimedia Forensics Is Not Computer Forensics. IWCF 2009: 90-103 - [c72]Felix C. Freiling, Christian Lambertz, Mila E. Majster-Cederbaum:
Modular Consensus Algorithms for the Crash-Recovery Model. PDCAT 2009: 287-292 - [c71]Ralf Hund, Thorsten Holz, Felix C. Freiling:
Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms. USENIX Security Symposium 2009: 383-398 - [c70]Philipp Trinius, Thorsten Holz, Jan Göbel, Felix C. Freiling:
Visual analysis of malware behavior using treemaps and thread graphs. VizSEC 2009: 33-38 - 2008
- [j15]Neeraj Mittal, Felix C. Freiling, Subbarayan Venkatesan, Lucia Draque Penso:
On termination detection in crash-prone distributed systems with failure detectors. J. Parallel Distributed Comput. 68(6): 855-875 (2008) - [c69]Zinaida Benenson, Markus Bestehorn, Erik Buchmann, Felix C. Freiling, Marek Jawurek:
Query Dissemination with Predictable Reachability and Energy Usage in Sensor Networks. ADHOC-NOW 2008: 279-292 - [c68]Felix C. Freiling, Thorsten Holz, Martin Mink:
Reconstructing People's Lives: A Case Study in Teaching Forensic Computing. IMF 2008: 125-141 - [c67]Thorsten Holz, Christian Gorecki, Konrad Rieck, Felix C. Freiling:
Measuring and Detecting Fast-Flux Service Networks. NDSS 2008 - [c66]Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst W. Biersack, Felix C. Freiling:
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. LEET 2008 - [c65]Ali Ikinci, Thorsten Holz, Felix C. Freiling:
Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients. Sicherheit 2008: 407-421 - [c64]Michael Becher, Felix C. Freiling:
Towards Dynamic Malware Analysis to Increase Mobile Device Security423. Sicherheit 2008: 423-433 - [c63]Felix C. Freiling, Jens Liebchen:
Iterative Kompromittierungsgraphverfeinerung als methodische Grundlage für Netzwerkpenetrationstests. Sicherheit 2008: 435-447 - [c62]Felix C. Freiling, Christian Lambertz, Mila E. Majster-Cederbaum:
Easy Consensus Algorithms for the Crash-Recovery Model. DISC 2008: 507-508 - [e2]Irene Eusgeld, Felix C. Freiling, Ralf H. Reussner:
Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30 - November 1, 2005]. Lecture Notes in Computer Science 4909, Springer 2008, ISBN 978-3-540-68946-1 [contents] - 2007
- [j14]Carsten Willems, Thorsten Holz, Felix C. Freiling:
Toward Automated Dynamic Malware Analysis Using CWSandbox. IEEE Secur. Priv. 5(2): 32-39 (2007) - [c61]Felix C. Freiling, Matthias Majuntke, Neeraj Mittal:
On Detecting Termination in the Crash-Recovery Model. Euro-Par 2007: 629-638 - [c60]Felix C. Freiling, Bastian Schwittay:
A Common Process Model for Incident Response and Computer Forensics. IMF 2007: 19-39 - [c59]Harish Daiya, Maximillian Dornseif, Felix C. Freiling:
Testing Forensic Hash Tools on Sparse Files. IMF 2007: 113-123 - [c58]Felix C. Freiling, Bastian Schwittay:
Towards Reliable Rootkit Detection in Live Response. IMF 2007: 125-143 - [c57]Zinaida Benenson, Felix C. Freiling, Peter M. Cholewinski:
Advanced Evasive Data Storage in Sensor Networks. MDM 2007: 146-151 - [c56]Roberto Cortiñas, Felix C. Freiling, Marjan Ghajar-Azadanlou, Alberto Lafuente, Mikel Larrea, Lucia Draque Penso, Iratxe Soraluze Arriola:
Secure Failure Detection in TrustedPals. SSS 2007: 173-188 - [c55]Felix C. Freiling, Arshad Jhumka:
Global Predicate Detection in Distributed Systems with Small Faults. SSS 2007: 296-310 - [c54]Carole Delporte-Gallet, Hugues Fauconnier, Felix C. Freiling, Lucia Draque Penso, Andreas Tielmann:
From Crash-Stop to Permanent Omission: Automatic Transformation and Weakest Failure Detectors. DISC 2007: 165-178 - [e1]Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman:
From Security to Dependability, 10.09. - 15.09.2006. Dagstuhl Seminar Proceedings 06371, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007 [contents] - 2006
- [j13]Helmut Reimer, Jana Dittmann, Claus Vielhauer, Felix C. Freiling, Francesca Saglietti, Manfred Reitenspieß, Andreas Lang:
Veranstaltungsbesprechungen. Datenschutz und Datensicherheit 30(4): 258-259 (2006) - [j12]Arshad Jhumka, Felix C. Freiling, Christof Fetzer, Neeraj Suri:
An approach to synthesise safe systems. Int. J. Secur. Networks 1(1/2): 62-74 (2006) - [j11]Felix C. Freiling, Hagen Völzer:
Illustrating the impossibility of crash-tolerant consensus in asynchronous systems. ACM SIGOPS Oper. Syst. Rev. 40(2): 105-109 (2006) - [c53]Zinaida Benenson, Felix C. Freiling, Thorsten Holz, Dogan Kesdogan, Lucia Draque Penso:
Safety, Liveness, and Information Flow: Dependability Revisited. ARCS Workshops 2006: 56-65 - [c52]Zinaida Benenson, Felix C. Freiling, Birgit Pfitzmann, Christian Rohner, Michael Waidner:
Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. ESAS 2006: 165-178 - [c51]Milan Fort, Felix C. Freiling, Lucia Draque Penso, Zinaida Benenson, Dogan Kesdogan:
TrustedPals: Secure Multiparty Computation Implemented with Smart Cards. ESORICS 2006: 34-48 - [c50]Philip Anderson, Maximillian Dornseif, Felix C. Freiling, Thorsten Holz, Alastair Irons, Christopher Laing, Martin Mink:
A Comparative Study of Teaching Forensics at a University Degree Level. IMF 2006: 116-127 - [c49]Martin Mink, Felix C. Freiling:
Is attack better than defense?: teaching information security the right way. InfoSecCD 2006: 44-48 - [c48]Neeraj Mittal, Kuppahalli L. Phaneesh, Felix C. Freiling:
Safe Termination Detection in an Asynchronous Distributed System When Processes May Crash and Recover. OPODIS 2006: 126-141 - [c47]Zinaida Benenson, Lexi Pimenidis, Felix C. Freiling, Stefan Lucks:
Authenticated Query Flooding in Sensor Networks. PerCom Workshops 2006: 644-647 - [c46]Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, Felix C. Freiling:
The Nepenthes Platform: An Efficient Approach to Collect Malware. RAID 2006: 165-184 - [c45]Zinaida Benenson, Felix C. Freiling, Ernest Hammerschmidt, Stefan Lucks, Lexi Pimenidis:
Authenticated Query Flooding in Sensor Networks. SEC 2006: 38-49 - [c44]Hans-Georg Eßer, Felix C. Freiling:
Kapazitätsmessung eines verdeckten Zeitkanals über HTTP. Sicherheit 2006: 115-118 - [c43]Timo Warns, Felix C. Freiling, Wilhelm Hasselbring:
Solving Consensus Using Structural Failure Models. SRDS 2006: 212-224 - [c42]Felix C. Freiling, Matthias Majuntke, Neeraj Mittal:
Brief Announcement: Termination Detection in an Asynchronous Distributed System with Crash-Recovery Failures. SSS 2006: 572-573 - [i3]Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman:
06371 Executive Summary -- From Security to Dependability. From Security to Dependability 2006 - [i2]Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman:
06371 Abstracts Collection -- From Security to Dependability. From Security to Dependability 2006 - 2005
- [c41]Irene Eusgeld, Felix C. Freiling:
Introduction to Dependability Metrics. Dependability Metrics 2005: 1-4 - [c40]Rainer Böhme, Felix C. Freiling:
On Metrics and Measurements. Dependability Metrics 2005: 7-13 - [c39]Felix C. Freiling:
Introduction to Security Metrics. Dependability Metrics 2005: 129-132 - [c38]Felix C. Freiling, Max Walter:
Reliability vs. Security: A Subjective Overview. Dependability Metrics 2005: 255-257 - [c37]Gildas Avoine, Felix C. Gärtner, Rachid Guerraoui, Marko Vukolic:
Gracefully Degrading Fair Exchange with Security Modules. EDCC 2005: 55-71 - [c36]Felix C. Freiling, Thorsten Holz, Georg Wicherski:
Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks. ESORICS 2005: 319-335 - [c35]Marc Shapiro, Idit Keidar, Felix C. Freiling, Luís E. T. Rodrigues:
Topic 8 - Distributed Systems and Algorithms. Euro-Par 2005: 593 - [c34]Zinaida Benenson, Felix C. Gärtner, Dogan Kesdogan:
An algorithmic framework for robust access control in wireless sensor networks. EWSN 2005: 158-165 - [c33]Felix C. Freiling, Neeraj Mittal, Lucia Draque Penso:
Transformations in Secure and Fault-Tolerant Distributed Computation. GI Jahrestagung (1) 2005: 410-412 - [c32]Carole Delporte-Gallet, Hugues Fauconnier, Felix C. Freiling:
Revisiting Failure Detection and Consensus in Omission Failure Environments. ICTAC 2005: 394-408 - [c31]Felix C. Freiling, Maurice Herlihy, Lucia Draque Penso:
Optimal Randomized Fair Exchange with Secret Shared Coins. OPODIS 2005: 61-72 - [c30]Zinaida Benenson, Peter M. Cholewinski, Felix C. Freiling:
Simple Evasive Data Storage in Sensor Networks. IASTED PDCS 2005: 779-784 - [c29]Zinaida Benenson, Felix C. Gärtner, Dogan Kesdogan:
Secure Multi-Party Computation with Security Modules. Sicherheit 2005: 41-52 - [c28]Felix C. Freiling, Sukumar Ghosh:
Code Stabilization. Self-Stabilizing Systems 2005: 128-139 - [c27]Neeraj Mittal, Felix C. Freiling, Subbarayan Venkatesan, Lucia Draque Penso:
Efficient Reduction for Wait-Free Termination Detection in a Crash-Prone Distributed System. DISC 2005: 93-107 - 2004
- [j10]Maximillian Dornseif, Felix C. Gärtner, Thorsten Holz:
Vulnerability Assessment using Honeypots. Prax. Inf.verarb. Kommun. 27(4): 195-201 (2004) - [c26]Christian Bunse, Felix C. Freiling, Nicole Lévy:
A Taxonomy on Component-Based Software Engineering Methods. Architecting Systems with Trustworthy Components 2004: 103-119 - [c25]Felix C. Freiling, Thomas Santen:
On the Composition of Compositional Reasoning. Architecting Systems with Trustworthy Components 2004: 137-151 - [c24]Maximillian Dornseif, Felix C. Gärtner, Thorsten Holz:
Ermittlung von Verwundbarkeiten mit elektronischen Ködern. DIMVA 2004: 129-141 - [c23]Felix C. Gärtner, Arshad Jhumka:
Automating the Addition of Fail-Safe Fault-Tolerance: Beyond Fusion-Closed Specifications. FORMATS/FTRTFT 2004: 183-198 - [c22]Zinaida Benenson, Felix C. Gärtner, Dogan Kesdogan:
User Authentication in Sensor Networks. GI Jahrestagung (2) 2004: 385-389 - [p2]Alejandro P. Buchmann, Christof Bornhövd, Mariano Cilia, Ludger Fiege, Felix C. Gärtner, Christoph Liebig, Matthias Meixner, Gero Mühl:
DREAM: Distributed Reliable Event-Based Application Management. Web Dynamics 2004: 319-352 - [i1]Maximillian Dornseif, Felix C. Gärtner, Thorsten Holz:
Ermittlung von Verwundbarkeiten mit elektronischen Koedern. CoRR cs.CR/0406059 (2004) - 2003
- [j9]Henning Pagnia, Holger Vogt, Felix C. Gärtner:
Fair Exchange. Comput. J. 46(1): 55-75 (2003) - [j8]Felix C. Gärtner, Levente Buttyán, Klaus Kursawe:
Dependable Systems: Podsy Workshop Report - From Fault Tolerance to Security and Back. IEEE Distributed Syst. Online 4(9) (2003) - [j7]Felix C. Gärtner:
Beobachten des Internet: Traum und Wirklichkeit (How to observe the Internet). it Inf. Technol. 45(6): 353-355 (2003) - [j6]Holger Vogt, Felix C. Gärtner, Henning Pagnia:
Supporting Fair Exchange in Mobile Environments. Mob. Networks Appl. 8(2): 127-136 (2003) - [c21]Felix C. Gärtner, Klaus Kursawe, Levente Buttyán:
PoDSy 2003: Principles of Dependable Systems. DSN 2003: 763 - [c20]Felix C. Gärtner:
Byzantine Failures and Security: Arbitrary is not (always) Random. GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit") 2003: 127-138 - [c19]Ludger Fiege, Andreas Zeidler, Felix C. Gärtner, Sidath B. Handurukande:
Dealing with Uncertainty in Mobile Publish/Subscribe Middleware. Middleware Workshops 2003: 60-67 - [c18]Ludger Fiege, Felix C. Gärtner, Oliver Kasten, Andreas Zeidler:
Supporting Mobility in Content-Based Publish/Subscribe Middleware. Middleware 2003: 103-122 - [c17]Jürgen Bohn, Felix C. Gärtner, Harald Vogt:
Dependability Issues of Pervasive Computing in a Healthcare Environment. SPC 2003: 53-70 - [c16]Felix C. Gärtner, Henning Pagnia:
Time-Efficient Self-Stabilizing Algorithms through Hierarchical Structures. Self-Stabilizing Systems 2003: 154-168 - 2002
- [j5]Ludger Fiege, Gero Mühl, Felix C. Gärtner:
Modular event-based systems. Knowl. Eng. Rev. 17(4): 359-388 (2002) - [c15]Felix C. Gärtner:
Revisiting Liveness Properties in the Context of Secure Systems. FASec 2002: 221-238 - [c14]Gero Mühl, Ludger Fiege, Felix C. Gärtner, Alejandro P. Buchmann:
Evaluating Advanced Routing Algorithms for Content-Based Publish/Subscribe Systems. MASCOTS 2002: 167-176 - [c13]Ludger Fiege, Gero Mühl, Felix C. Gärtner:
A modular approach to build structured event-based systems. SAC 2002: 385-392 - [c12]Felix C. Gärtner, Stefan Pleisch:
Failure Detection Sequencers: Necessary and Sufficient Information about Failures to Solve Predicate Detection. DISC 2002: 280-294 - 2001
- [b1]Felix C. Freiling:
Formale Grundlagen der Fehlertoleranz in verteilten Systemen. Darmstadt University of Technology, Germany, 2001, pp. 1-186 - [c11]Holger Vogt, Henning Pagnia, Felix C. Gärtner:
Using Smart Cards for Fair Exchange. WELCOM 2001: 101-113 - [c10]Felix C. Gärtner, Stefan Pleisch:
(Im)Possibilities of Predicate Detection in Crash-Affected Systems. WSS 2001: 98-113 - [p1]Felix C. Gärtner:
Formale Grundlagen der Fehlertoleranz in verteilten Systemen. Ausgezeichnete Informatikdissertationen 2001: 39-49 - 2000
- [j4]Heiko Mantel, Felix C. Gärtner:
A case study in the mechanical verification of fault tolerance. J. Exp. Theor. Artif. Intell. 12(4): 473-487 (2000) - [c9]Heiko Mantel, Felix C. Gärtner:
A Case Study in the Mechanical Verification of Fault Tolerance. FLAIRS 2000: 341-345 - [c8]Marc Theisen, Felix C. Gärtner:
Correctness Preserving Transformations for the Design of Parallelized Low-Power Systems. GI Jahrestagung 2000: 165-180 - [c7]Henning Pagnia, Holger Vogt, Felix C. Gärtner, Uwe G. Wilhelm:
Solving Fair Exchange with Mobile Agents. ASA/MA 2000: 57-72 - [c6]Felix C. Gärtner, Sven Kloppenburg:
Consistent Detection of Global Predicates under a Weak Fault Assumption. SRDS 2000: 94-103
1990 – 1999
- 1999
- [j3]Felix C. Gärtner:
Fundamentals of Fault-Tolerant Distributed Computing in Asynchronous Environments. ACM Comput. Surv. 31(1): 1-26 (1999) - [j2]Felix C. Gärtner:
Transformational Approaches to the Specification and Verification of Fault-Tolerant Systems: Formal Background and Classification. J. Univers. Comput. Sci. 5(10): 668-692 (1999) - [c5]Holger Vogt, Henning Pagnia, Felix C. Gärtner:
Modular Fair Exchange Protocols for Electronic Commerce. ACSAC 1999: 3-11 - [c4]Felix C. Gärtner, Marc Theisen:
Transformationen zur parallelisierten und fehlertoleranten Informationsverarbeitung. GI Jahrestagung 1999: 207-214 - [c3]Felix C. Gärtner, Henning Pagnia, Holger Vogt:
Approaching a Formal Definition of Fairness in Electronic Commerce. SRDS 1999: 354-359 - [c2]Oliver E. Theel, Felix C. Gärtner:
An exercise in proving convergence through transfer functions. WSS 1999: 41-47 - [c1]Felix C. Gärtner, Henning Pagnia:
Self-stabilizing load distribution for replicated servers on a per-access basis. WSS 1999: 102-109 - 1998
- [j1]Felix C. Gärtner:
Aller Jahre wieder ... Eine fiktive Leidensgeschichte. Inform. Spektrum 21(3): 161 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 20:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint