His Statistics research incorporates a variety of disciplines, including Empirical research and Data science. Data science and Statistics are two areas of study in which Felix C. Freiling engages in interdisciplinary research. His multidisciplinary approach integrates Computer security and Encryption in his work. Felix C. Freiling merges Encryption with Computer forensics in his research. By researching both Computer forensics and Digital forensics, Felix C. Freiling produces research that crosses academic boundaries. He combines Digital forensics and Computer security in his studies. His multidisciplinary approach integrates Operating system and Human–computer interaction in his work. He undertakes interdisciplinary study in the fields of Human–computer interaction and Operating system through his works. His Computer network study frequently links to other fields, such as Identifier.
Felix C. Freiling incorporates Computer security and Internet privacy in his research. Internet privacy and Computer security are two areas of study in which he engages in interdisciplinary research. He combines Operating system and Software in his research. He integrates many fields, such as Computer network and Distributed computing, in his works. His work often combines Distributed computing and Computer network studies. His research brings together the fields of Detector and Telecommunications. His Telecommunications research extends to the thematically linked field of Detector. Software engineering and Software are two areas of study in which Felix C. Freiling engages in interdisciplinary research.
His study on Botany is mostly dedicated to connecting different topics, such as Taxonomy (biology) and Identification (biology). Much of his study explores Identification (biology) relationship to Botany. He undertakes interdisciplinary study in the fields of Computer security and Digital forensics through his research. In his works, he performs multidisciplinary study on Digital forensics and Computer security. Computer vision is frequently linked to Image (mathematics) in his study. His Image (mathematics) study frequently links to related topics such as JPEG. His JPEG study frequently intersects with other fields, such as Artificial intelligence. Felix C. Freiling performs multidisciplinary studies into Artificial intelligence and Computer vision in his work. His research on Epistemology often connects related topics like Quality (philosophy).
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Toward Automated Dynamic Malware Analysis Using CWSandbox
C. Willems;T. Holz;F. Freiling.
ieee symposium on security and privacy (2007)
Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm
Thorsten Holz;Moritz Steiner;Frederic Dahl;Ernst Biersack.
LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats (2008)
Measuring and Detecting Fast-Flux Service Networks
Thorsten Holz;Christian Gorecki;Konrad Rieck;Felix C. Freiling.
network and distributed system security symposium (2008)
The nepenthes platform : An efficient approach to collect malware
Paul Baecher;Markus Koetter;Thorsten Holz;Maximillian Dornseif.
Lecture Notes in Computer Science (2006)
Botnet tracking: exploring a root-cause methodology to prevent distributed denial-of-service attacks
Felix C. Freiling;Thorsten Holz;Georg Wicherski.
european symposium on research in computer security (2005)
Mobile-sandbox: having a deeper look into android applications
Michael Spreitzenbarth;Felix Freiling;Florian Echtler;Thomas Schreck.
acm symposium on applied computing (2013)
Return-oriented rootkits: bypassing kernel code integrity protection mechanisms
Ralf Hund;Thorsten Holz;Felix C. Freiling.
usenix security symposium (2009)
Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices
Michael Becher;Felix C. Freiling;Johannes Hoffmann;Thorsten Holz.
ieee symposium on security and privacy (2011)
Learning more about the underground economy: a case-study of keyloggers and dropzones
Thorsten Holz;Markus Engelberth;Felix Freiling.
european symposium on research in computer security (2009)
On Botnets That Use DNS for Command and Control.
Christian J. Dietrich;Christian Rossow;Felix C. Freiling;Herbert Bos.
electronic commerce (2011)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: