H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 30 Citations 7,940 149 World Ranking 8891 National Ranking 429


What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Microsoft Windows
  • Computer security

His primary areas of study are Computer security, Malware, Computer network, Botnet and Intrusion detection system. His work on Computer forensics is typically connected to Empirical research as part of general Computer security study, connecting several disciplines of science. His work on Cyber-collection and Malware analysis as part of general Malware research is often related to DLL injection, thus linking different fields of science.

His research integrates issues of Key distribution in wireless sensor networks and Wireless sensor network in his study of Intrusion detection system. His work in Mariposa botnet addresses subjects such as Storm botnet, which are connected to disciplines such as Peer-to-peer and Remote control. His work deals with themes such as High availability and Honeypot, which intersect with Host.

His most cited work include:

  • Toward Automated Dynamic Malware Analysis Using CWSandbox (640 citations)
  • The nepenthes platform: an efficient approach to collect malware (428 citations)
  • Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm (345 citations)

What are the main themes of his work throughout his whole career to date?

Felix C. Freiling spends much of his time researching Computer security, Distributed computing, Computer network, Malware and Crash. Felix C. Freiling works on Computer security which deals in particular with Information security. His Distributed computing study incorporates themes from Smart card and Asynchronous communication.

Felix C. Freiling studies Wireless sensor network which is a part of Computer network. His research in Malware is mostly focused on Malware analysis. His Crash research is multidisciplinary, incorporating perspectives in Failure detector, Detector, Asynchronous distributed systems and Algorithm, Computation.

He most often published in these fields:

  • Computer security (33.33%)
  • Distributed computing (15.02%)
  • Computer network (11.27%)

What were the highlights of his more recent work (between 2016-2021)?

  • Computer security (33.33%)
  • Software (7.51%)
  • Digital evidence (5.63%)

In recent papers he was focusing on the following fields of study:

His primary scientific interests are in Computer security, Software, Digital evidence, Information retrieval and Operating system. Vulnerability and General Data Protection Regulation are among the areas of Computer security where he concentrates his study. His Software research incorporates themes from JPEG, Computer hardware, Data acquisition, Header and Container.

His Digital evidence study combines topics from a wide range of disciplines, such as Attacker model, Authentication and Algorithm, Cryptography. When carried out as part of a general Operating system research project, his work on Host and Controller is frequently linked to work in Industrial control system, System virtualization and Baseboard, therefore connecting diverse disciplines of study. The study incorporates disciplines such as Embedded system and Malware in addition to Encryption.

Between 2016 and 2021, his most popular works were:

  • Hardware-Based Trusted Computing Architectures for Isolation and Attestation (72 citations)
  • Sancus 2.0: A Low-Cost Security Architecture for IoT Devices (37 citations)
  • A standardized corpus for SQLite database forensics (14 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Microsoft Windows
  • Computer network

Computer security, Encryption, Information retrieval, Embedded system and Operating system are his primary areas of study. His specific area of interest is Computer security, where Felix C. Freiling studies Vulnerability. His Encryption research is multidisciplinary, incorporating elements of System software, Trusted computing base, Taxonomy, Hardware architecture and Thesaurus.

His Information retrieval research incorporates themes from Set and Database forensics. He combines subjects such as Shared memory, Memory protection, Enterprise information security architecture, Toolchain and On-the-fly encryption with his study of Embedded system. His research integrates issues of Transaction time and Blockchain in his study of Operating system.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Toward Automated Dynamic Malware Analysis Using CWSandbox

C. Willems;T. Holz;F. Freiling.
ieee symposium on security and privacy (2007)

1044 Citations

Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm

Thorsten Holz;Moritz Steiner;Frederic Dahl;Ernst Biersack.
LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats (2008)

589 Citations

The nepenthes platform: an efficient approach to collect malware

Paul Baecher;Markus Koetter;Thorsten Holz;Maximillian Dornseif.
recent advances in intrusion detection (2006)

500 Citations

Measuring and Detecting Fast-Flux Service Networks

Thorsten Holz;Christian Gorecki;Konrad Rieck;Felix C. Freiling.
network and distributed system security symposium (2008)

489 Citations

Botnet tracking: exploring a root-cause methodology to prevent distributed denial-of-service attacks

Felix C. Freiling;Thorsten Holz;Georg Wicherski.
european symposium on research in computer security (2005)

461 Citations

Mobile-sandbox: having a deeper look into android applications

Michael Spreitzenbarth;Felix Freiling;Florian Echtler;Thomas Schreck.
acm symposium on applied computing (2013)

381 Citations

Return-oriented rootkits: bypassing kernel code integrity protection mechanisms

Ralf Hund;Thorsten Holz;Felix C. Freiling.
usenix security symposium (2009)

344 Citations

Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices

Michael Becher;Felix C. Freiling;Johannes Hoffmann;Thorsten Holz.
ieee symposium on security and privacy (2011)

296 Citations

Learning more about the underground economy: a case-study of keyloggers and dropzones

Thorsten Holz;Markus Engelberth;Felix Freiling.
european symposium on research in computer security (2009)

288 Citations

A structured approach to anomaly detection for in-vehicle networks

Michael Muter;Andre Groll;Felix C. Freiling.
information assurance and security (2010)

205 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Felix C. Freiling

Thorsten Holz

Thorsten Holz

Ruhr University Bochum

Publications: 50

Christopher Kruegel

Christopher Kruegel

University of California, Santa Barbara

Publications: 38

Wenke Lee

Wenke Lee

Georgia Institute of Technology

Publications: 32

Giovanni Vigna

Giovanni Vigna

University of California, Santa Barbara

Publications: 26

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

TU Darmstadt

Publications: 25

Mourad Debbabi

Mourad Debbabi

Concordia University

Publications: 23

Engin Kirda

Engin Kirda

Northeastern University

Publications: 22

Frank Piessens

Frank Piessens

KU Leuven

Publications: 20

Michalis Polychronakis

Michalis Polychronakis

Stony Brook University

Publications: 19

Konrad Rieck

Konrad Rieck

Technische Universität Braunschweig

Publications: 18

Xuxian Jiang

Xuxian Jiang


Publications: 17

Roberto Perdisci

Roberto Perdisci

University of Georgia

Publications: 17

Davide Balzarotti

Davide Balzarotti


Publications: 16

Gianluca Stringhini

Gianluca Stringhini

Boston University

Publications: 15

Angelos D. Keromytis

Angelos D. Keromytis

Georgia Institute of Technology

Publications: 14

Something went wrong. Please try again later.