His primary areas of study are Computer security, Malware, Computer network, Botnet and Intrusion detection system. His work on Computer forensics is typically connected to Empirical research as part of general Computer security study, connecting several disciplines of science. His work on Cyber-collection and Malware analysis as part of general Malware research is often related to DLL injection, thus linking different fields of science.
His research integrates issues of Key distribution in wireless sensor networks and Wireless sensor network in his study of Intrusion detection system. His work in Mariposa botnet addresses subjects such as Storm botnet, which are connected to disciplines such as Peer-to-peer and Remote control. His work deals with themes such as High availability and Honeypot, which intersect with Host.
Felix C. Freiling spends much of his time researching Computer security, Distributed computing, Computer network, Malware and Crash. Felix C. Freiling works on Computer security which deals in particular with Information security. His Distributed computing study incorporates themes from Smart card and Asynchronous communication.
Felix C. Freiling studies Wireless sensor network which is a part of Computer network. His research in Malware is mostly focused on Malware analysis. His Crash research is multidisciplinary, incorporating perspectives in Failure detector, Detector, Asynchronous distributed systems and Algorithm, Computation.
His primary scientific interests are in Computer security, Software, Digital evidence, Information retrieval and Operating system. Vulnerability and General Data Protection Regulation are among the areas of Computer security where he concentrates his study. His Software research incorporates themes from JPEG, Computer hardware, Data acquisition, Header and Container.
His Digital evidence study combines topics from a wide range of disciplines, such as Attacker model, Authentication and Algorithm, Cryptography. When carried out as part of a general Operating system research project, his work on Host and Controller is frequently linked to work in Industrial control system, System virtualization and Baseboard, therefore connecting diverse disciplines of study. The study incorporates disciplines such as Embedded system and Malware in addition to Encryption.
Computer security, Encryption, Information retrieval, Embedded system and Operating system are his primary areas of study. His specific area of interest is Computer security, where Felix C. Freiling studies Vulnerability. His Encryption research is multidisciplinary, incorporating elements of System software, Trusted computing base, Taxonomy, Hardware architecture and Thesaurus.
His Information retrieval research incorporates themes from Set and Database forensics. He combines subjects such as Shared memory, Memory protection, Enterprise information security architecture, Toolchain and On-the-fly encryption with his study of Embedded system. His research integrates issues of Transaction time and Blockchain in his study of Operating system.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Toward Automated Dynamic Malware Analysis Using CWSandbox
C. Willems;T. Holz;F. Freiling.
ieee symposium on security and privacy (2007)
Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm
Thorsten Holz;Moritz Steiner;Frederic Dahl;Ernst Biersack.
LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats (2008)
The nepenthes platform: an efficient approach to collect malware
Paul Baecher;Markus Koetter;Thorsten Holz;Maximillian Dornseif.
recent advances in intrusion detection (2006)
Measuring and Detecting Fast-Flux Service Networks
Thorsten Holz;Christian Gorecki;Konrad Rieck;Felix C. Freiling.
network and distributed system security symposium (2008)
Botnet tracking: exploring a root-cause methodology to prevent distributed denial-of-service attacks
Felix C. Freiling;Thorsten Holz;Georg Wicherski.
european symposium on research in computer security (2005)
Mobile-sandbox: having a deeper look into android applications
Michael Spreitzenbarth;Felix Freiling;Florian Echtler;Thomas Schreck.
acm symposium on applied computing (2013)
Return-oriented rootkits: bypassing kernel code integrity protection mechanisms
Ralf Hund;Thorsten Holz;Felix C. Freiling.
usenix security symposium (2009)
Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices
Michael Becher;Felix C. Freiling;Johannes Hoffmann;Thorsten Holz.
ieee symposium on security and privacy (2011)
Learning more about the underground economy: a case-study of keyloggers and dropzones
Thorsten Holz;Markus Engelberth;Felix Freiling.
european symposium on research in computer security (2009)
A structured approach to anomaly detection for in-vehicle networks
Michael Muter;Andre Groll;Felix C. Freiling.
information assurance and security (2010)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: