D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 31 Citations 8,085 208 World Ranking 9517 National Ranking 459

Overview

What is he best known for?

The fields of study Felix C. Freiling is best known for:

  • The Internet
  • Operating system
  • Computer security

His Statistics research incorporates a variety of disciplines, including Empirical research and Data science. Data science and Statistics are two areas of study in which Felix C. Freiling engages in interdisciplinary research. His multidisciplinary approach integrates Computer security and Encryption in his work. Felix C. Freiling merges Encryption with Computer forensics in his research. By researching both Computer forensics and Digital forensics, Felix C. Freiling produces research that crosses academic boundaries. He combines Digital forensics and Computer security in his studies. His multidisciplinary approach integrates Operating system and Human–computer interaction in his work. He undertakes interdisciplinary study in the fields of Human–computer interaction and Operating system through his works. His Computer network study frequently links to other fields, such as Identifier.

His most cited work include:

  • The Nepenthes Platform: An Efficient Approach to Collect Malware (245 citations)
  • Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks (218 citations)
  • Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones (138 citations)

What are the main themes of his work throughout his whole career to date

Felix C. Freiling incorporates Computer security and Internet privacy in his research. Internet privacy and Computer security are two areas of study in which he engages in interdisciplinary research. He combines Operating system and Software in his research. He integrates many fields, such as Computer network and Distributed computing, in his works. His work often combines Distributed computing and Computer network studies. His research brings together the fields of Detector and Telecommunications. His Telecommunications research extends to the thematically linked field of Detector. Software engineering and Software are two areas of study in which Felix C. Freiling engages in interdisciplinary research.

Felix C. Freiling most often published in these fields:

  • Computer security (71.74%)
  • Operating system (32.61%)
  • Programming language (30.43%)

What were the highlights of his more recent work (between 2018-2021)?

  • Computer security (100.00%)
  • Botany (66.67%)
  • Data science (66.67%)

In recent works Felix C. Freiling was focusing on the following fields of study:

His study on Botany is mostly dedicated to connecting different topics, such as Taxonomy (biology) and Identification (biology). Much of his study explores Identification (biology) relationship to Botany. He undertakes interdisciplinary study in the fields of Computer security and Digital forensics through his research. In his works, he performs multidisciplinary study on Digital forensics and Computer security. Computer vision is frequently linked to Image (mathematics) in his study. His Image (mathematics) study frequently links to related topics such as JPEG. His JPEG study frequently intersects with other fields, such as Artificial intelligence. Felix C. Freiling performs multidisciplinary studies into Artificial intelligence and Computer vision in his work. His research on Epistemology often connects related topics like Quality (philosophy).

Between 2018 and 2021, his most popular works were:

  • A universal taxonomy and survey of forensic memory acquisition techniques (19 citations)
  • Forensic source identification using JPEG image headers: The case of smartphones (18 citations)
  • Towards GDPR-compliant data processing in modern SIEM systems (10 citations)

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Toward Automated Dynamic Malware Analysis Using CWSandbox

C. Willems;T. Holz;F. Freiling.
ieee symposium on security and privacy (2007)

1114 Citations

Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm

Thorsten Holz;Moritz Steiner;Frederic Dahl;Ernst Biersack.
LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats (2008)

603 Citations

Measuring and Detecting Fast-Flux Service Networks

Thorsten Holz;Christian Gorecki;Konrad Rieck;Felix C. Freiling.
network and distributed system security symposium (2008)

549 Citations

The nepenthes platform : An efficient approach to collect malware

Paul Baecher;Markus Koetter;Thorsten Holz;Maximillian Dornseif.
Lecture Notes in Computer Science (2006)

512 Citations

Botnet tracking: exploring a root-cause methodology to prevent distributed denial-of-service attacks

Felix C. Freiling;Thorsten Holz;Georg Wicherski.
european symposium on research in computer security (2005)

465 Citations

Mobile-sandbox: having a deeper look into android applications

Michael Spreitzenbarth;Felix Freiling;Florian Echtler;Thomas Schreck.
acm symposium on applied computing (2013)

386 Citations

Return-oriented rootkits: bypassing kernel code integrity protection mechanisms

Ralf Hund;Thorsten Holz;Felix C. Freiling.
usenix security symposium (2009)

353 Citations

Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices

Michael Becher;Felix C. Freiling;Johannes Hoffmann;Thorsten Holz.
ieee symposium on security and privacy (2011)

309 Citations

Learning more about the underground economy: a case-study of keyloggers and dropzones

Thorsten Holz;Markus Engelberth;Felix Freiling.
european symposium on research in computer security (2009)

298 Citations

On Botnets That Use DNS for Command and Control.

Christian J. Dietrich;Christian Rossow;Felix C. Freiling;Herbert Bos.
electronic commerce (2011)

278 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Felix C. Freiling

Thorsten Holz

Thorsten Holz

Ruhr University Bochum

Publications: 50

Christopher Kruegel

Christopher Kruegel

University of California, Santa Barbara

Publications: 38

Wenke Lee

Wenke Lee

Georgia Institute of Technology

Publications: 32

Giovanni Vigna

Giovanni Vigna

University of California, Santa Barbara

Publications: 26

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

Technical University of Darmstadt

Publications: 25

Christian Rossow

Christian Rossow

Saarland University

Publications: 25

Mourad Debbabi

Mourad Debbabi

Concordia University

Publications: 23

Engin Kirda

Engin Kirda

Northeastern University

Publications: 22

Frank Piessens

Frank Piessens

KU Leuven

Publications: 20

Michalis Polychronakis

Michalis Polychronakis

Stony Brook University

Publications: 19

Konrad Rieck

Konrad Rieck

Technische Universität Braunschweig

Publications: 18

Xuxian Jiang

Xuxian Jiang

PeckShield

Publications: 17

Roberto Perdisci

Roberto Perdisci

University of Georgia

Publications: 17

Davide Balzarotti

Davide Balzarotti

EURECOM

Publications: 16

Gianluca Stringhini

Gianluca Stringhini

Boston University

Publications: 15

Guofei Gu

Guofei Gu

Texas A&M University

Publications: 14

Trending Scientists

Nikos Vlassis

Nikos Vlassis

Netflix (United States)

Melissa A. Denecke

Melissa A. Denecke

University of Manchester

Bernardo R. Broitman

Bernardo R. Broitman

Adolfo Ibáñez University

Mito Kanatsu-Shinohara

Mito Kanatsu-Shinohara

Kyoto University

Pedro Moradas-Ferreira

Pedro Moradas-Ferreira

University of Porto

Louise Brueton

Louise Brueton

Northwick Park Hospital

Randall J. Weselake

Randall J. Weselake

University of Alberta

Rab K. Prinjha

Rab K. Prinjha

GlaxoSmithKline (United Kingdom)

Ian A. Graham

Ian A. Graham

University of York

Patrick Mehlen

Patrick Mehlen

UniCancer Group

Robert S. Lanciotti

Robert S. Lanciotti

Centers for Disease Control and Prevention

Aymeric Spiga

Aymeric Spiga

Sorbonne University

Raymond van Ee

Raymond van Ee

Radboud University Nijmegen

Eric B. Elbogen

Eric B. Elbogen

Duke University

Meg Gerrard

Meg Gerrard

University of Connecticut

Bob S. Carter

Bob S. Carter

Harvard University

Something went wrong. Please try again later.