D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 30 Citations 4,640 73 World Ranking 10150 National Ranking 484

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer network
  • The Internet

Christian Rossow mostly deals with Computer security, Malware, Denial-of-service attack, Botnet and Honeypot. His work in Computer security addresses subjects such as Server, which are connected to disciplines such as Handshake. His Malware research is multidisciplinary, relying on both Transparency, The Internet, Data science and Presentation.

As part of his studies on Denial-of-service attack, Christian Rossow often connects relevant subjects like Communications protocol. He combines subjects such as Peer-to-peer, Resilience, Network security, Node and Internet privacy with his study of Botnet. His Exploit study combines topics from a wide range of disciplines, such as World Wide Web and Bytecode.

His most cited work include:

  • Amplification Hell: Revisiting Network Protocols for DDoS Abuse (211 citations)
  • Manufacturing compromise: the emergence of exploit-as-a-service (173 citations)
  • Prudent Practices for Designing Malware Experiments: Status Quo and Outlook (141 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of investigation include Computer security, Malware, Computer network, Denial-of-service attack and Botnet. He has included themes like Android and Web application, The Internet, World Wide Web, Server in his Computer security study. His Malware research is multidisciplinary, incorporating elements of De facto standard, Sandbox and Scalability.

His work in the fields of Computer network, such as Traffic analysis and Network packet, overlaps with other areas such as Crawling and IP address spoofing. The Denial-of-service attack study combines topics in areas such as Great Cannon, Communications protocol, Spoofing attack and Honeypot. His Botnet research focuses on subjects like Peer-to-peer, which are linked to Resilience.

He most often published in these fields:

  • Computer security (66.23%)
  • Malware (27.27%)
  • Computer network (20.78%)

What were the highlights of his more recent work (between 2017-2021)?

  • Computer security (66.23%)
  • Computer network (20.78%)
  • Malware (27.27%)

In recent papers he was focusing on the following fields of study:

Christian Rossow focuses on Computer security, Computer network, Malware, Speculative execution and Traffic analysis. His Computer security research is multidisciplinary, relying on both Android and Mobile apps. His biological study spans a wide range of topics, including Denial-of-service attack, The Internet and Transient.

His research investigates the connection between Denial-of-service attack and topics such as Cache that intersect with problems in Server. His Malware research is multidisciplinary, incorporating perspectives in Variable, Identifier, De facto standard and Sandbox. He focuses mostly in the field of Speculative execution, narrowing it down to matters related to Branch predictor and, in some cases, Software and Cover.

Between 2017 and 2021, his most popular works were:

  • teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts (125 citations)
  • ret2spec: Speculative Execution Using Return Stack Buffers (92 citations)
  • The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators (22 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Computer network
  • The Internet

Christian Rossow mostly deals with Computer security, Focus, Cryptocurrency, Mobile apps and Android. His study in Identification extends to Computer security with its themes. His Focus research includes elements of Social media, Vulnerability disclosure and Internet privacy.

His Cryptocurrency study integrates concerns from other disciplines, such as Exploit and Bytecode.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Amplification Hell: Revisiting Network Protocols for DDoS Abuse

Christian Rossow.
network and distributed system security symposium (2014)

447 Citations

IoTPOT: analysing the rise of IoT compromises

Yin Minn Pa Pa;Shogo Suzuki;Katsunari Yoshioka;Tsutomu Matsumoto.
WOOT'15 Proceedings of the 9th USENIX Conference on Offensive Technologies (2015)

297 Citations

On Botnets That Use DNS for Command and Control.

Christian J. Dietrich;Christian Rossow;Felix C. Freiling;Herbert Bos.
electronic commerce (2011)

278 Citations

Manufacturing compromise: the emergence of exploit-as-a-service

Chris Grier;Lucas Ballard;Juan Caballero;Neha Chachra.
computer and communications security (2012)

277 Citations

Prudent Practices for Designing Malware Experiments: Status Quo and Outlook

C. Rossow;C. J. Dietrich;C. Grier;C. Kreibich.
ieee symposium on security and privacy (2012)

238 Citations

SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets

C. Rossow;D. Andriesse;T. Werner;B. Stone-Gross.
ieee symposium on security and privacy (2013)

217 Citations

Exit from hell? reducing the impact of amplification DDoS attacks

Marc Kührer;Thomas Hupperich;Christian Rossow;Thorsten Holz.
usenix security symposium (2014)

206 Citations

IoTPOT: A Novel Honeypot for Revealing Current IoT Threats

Yin Minn Pa Pa;Shogo Suzuki;Katsunari Yoshioka;Tsutomu Matsumoto.
Journal of Information Processing (2016)

197 Citations

Paint It Black: Evaluating the Effectiveness of Malware Blacklists

Marc Kührer;Christian Rossow;Thorsten Holz.
recent advances in intrusion detection (2014)

170 Citations

teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts

Johannes Krupp;Christian Rossow.
usenix security symposium (2018)

168 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Christian Rossow

Giovanni Vigna

Giovanni Vigna

University of California, Santa Barbara

Publications: 19

Mourad Debbabi

Mourad Debbabi

Concordia University

Publications: 19

Gianluca Stringhini

Gianluca Stringhini

Boston University

Publications: 18

Christopher Kruegel

Christopher Kruegel

University of California, Santa Barbara

Publications: 17

Herbert Bos

Herbert Bos

Vrije Universiteit Amsterdam

Publications: 17

Damon McCoy

Damon McCoy

New York University

Publications: 14

Asaf Shabtai

Asaf Shabtai

Ben-Gurion University of the Negev

Publications: 14

Yuval Elovici

Yuval Elovici

Ben-Gurion University of the Negev

Publications: 13

Max Mühlhäuser

Max Mühlhäuser

Technical University of Darmstadt

Publications: 12

Fabio Massacci

Fabio Massacci

Vrije Universiteit Amsterdam

Publications: 12

Songqing Chen

Songqing Chen

George Mason University

Publications: 12

Michael Bailey

Michael Bailey

University of Illinois at Urbana-Champaign

Publications: 12

Xiapu Luo

Xiapu Luo

Hong Kong Polytechnic University

Publications: 11

Thorsten Holz

Thorsten Holz

Ruhr University Bochum

Publications: 11

Engin Kirda

Engin Kirda

Northeastern University

Publications: 11

Stefan Savage

Stefan Savage

University of California, San Diego

Publications: 11

Something went wrong. Please try again later.