Pfeil- und Text-Symbol

Artikel von Christian Rossow

C. Dietrich, N. Pohlmann, C. Rossow: “Blockwerk - IP-Blacklists sinnvoll kombinieren”, iX - Magazin für professionelle Informationstechnik, Heise-Verlag, 01/2008

C. Dietrich, N. Pohlmann, C. Rossow: “Empirische Untersuchung von IP-Blacklisten”. In Proceedings der DACH Security Konferenz 2008, Hrsg.: Patrick Horster, syssec Verlag, 2008

C. Dietrich, N. Pohlmann, C. Rossow: “E-Mail Spam Threats and Mitigation Recent research results”, ENISA Quarterly Vol. 4, No. 2, Apr-Jun 2008

T. Czerwinski, C. Dietrich, N. Pohlmann, C. Rossow: “Detecting Gray in Black and White”. In Proceedings of the MIT Spam Conference, Boston, USA. March 2010

C. Rossow, C. Dietrich, H. Bos, L. Cavallaro, M. van Steen, F. Freiling, N. Pohlmann: “Network Traffic Analysis of Malicious Software”. In Proceedings of the Workshop on Building Analysis Datasets and Gathering Experience Returns for Security - BADGERS 2011, Salzburg, Austria, April 2011

C. Dietrich, C. Rossow, F. Freiling, H. Bos, M. van Steen, N. Pohlmann: “On Botnets that use DNS for Command and Control”, Proc. European Conf. Computer Network Defense (EC2ND 2011), Gothenberg, Sweden, Sept. 2011

C. Dietrich, C. Rossow, N. Pohlmann: “eID Online Authentication Network Threat Model, Attacks and Implications”. In Proceedings des 19. DFN Workshop 2012

H. Bos, C. Dietrich, C. Grier, C. Kreibich, V. Paxson, N. Pohlmann, M. van Steen, C. Rossow: “Prudent Practices for Designing Malware Experiments: Status Quo and Outlook”. 33rd IEEE Symposium on Security and Privacy, S&P 2012, San Francisco, CA, USA 2012

C. Dietrich, N. Pohlmann, C. Rossow: “CoCoSpot: Clustering and Recognizing Botnet Command and Control Channels using Traffic Analysis”. A Special Issue of Computer Networks On "Botnet Activity: Analysis, Detection and Shutdown", Elsevier, July 2012

C. Dietrich, N. Pohlmann, C. Rossow: “Exploiting Visual Appearance to Cluster and Detect Rogue Software”. In ACM Symposium On Applied Computing (SAC), 2013

Zum Seitenanfang springen