H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 62 Citations 15,849 188 World Ranking 1395 National Ranking 49

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • The Internet
  • Computer security

The scientist’s investigation covers issues in Computer security, Botnet, Malware, Internet privacy and Software. His Computer security research incorporates elements of Denial-of-service attack, The Internet and World Wide Web. His Fast flux study in the realm of The Internet interacts with subjects such as Mobile search.

Thorsten Holz has included themes like Machine learning and Computer virus in his Malware study. The various areas that Thorsten Holz examines in his Internet privacy study include Social spam, Web page, Contextual advertising and Forum spam. The concepts of his Software study are interwoven with issues in Executable, Trojan, Intermediate language, Source code and Discriminative model.

His most cited work include:

  • Toward Automated Dynamic Malware Analysis Using CWSandbox (640 citations)
  • Learning and Classification of Malware Behavior (458 citations)
  • The nepenthes platform: an efficient approach to collect malware (428 citations)

What are the main themes of his work throughout his whole career to date?

Thorsten Holz mainly focuses on Computer security, The Internet, Malware, Software and Internet privacy. His research in Computer security intersects with topics in World Wide Web and Botnet. Thorsten Holz interconnects Computer network and Server in the investigation of issues within The Internet.

His Software research incorporates themes from Code and Source code. Thorsten Holz combines subjects such as Executable and Memory corruption with his study of Source code. His Internet privacy research is multidisciplinary, incorporating elements of Transparency, General Data Protection Regulation and Online advertising.

He most often published in these fields:

  • Computer security (48.57%)
  • The Internet (15.10%)
  • Malware (14.29%)

What were the highlights of his more recent work (between 2017-2021)?

  • Computer security (48.57%)
  • Internet privacy (12.65%)
  • Memory corruption (6.53%)

In recent papers he was focusing on the following fields of study:

His primary areas of study are Computer security, Internet privacy, Memory corruption, General Data Protection Regulation and Programming language. His Computer security study frequently draws connections to adjacent fields such as Class. His biological study spans a wide range of topics, including Online advertising, Transparency and Personalization.

His work carried out in the field of Memory corruption brings together such families of science as Embedded system and Source code. His work deals with themes such as Subject access, Framing and Personally identifiable information, which intersect with General Data Protection Regulation. His work focuses on many connections between Pointer and other disciplines, such as Software, that overlap with his field of interest in Machine learning, Function pointer, Virtual function and Artificial intelligence.

Between 2017 and 2021, his most popular works were:

  • Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding. (70 citations)
  • (Un)informed Consent: Studying GDPR Consent Notices in the Field (67 citations)
  • REDQUEEN: Fuzzing with Input-to-State Correspondence. (61 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • The Internet
  • Programming language

His main research concerns Internet privacy, Computer security, General Data Protection Regulation, Fuzz testing and Artificial intelligence. His Internet privacy study combines topics from a wide range of disciplines, such as Adware, Malware and Personalization. In his research, he undertakes multidisciplinary study on Computer security and Mobile telephony.

His General Data Protection Regulation research also works with subjects such as

  • Transparency, which have a strong connection to The Internet, Internet security, Implementation and Subject access,
  • Online advertising that intertwine with fields like Data access, Subject, Personally identifiable information and Sharing economy. He has researched Fuzz testing in several fields, including Theoretical computer science and State. His Artificial intelligence research includes elements of Frequency analysis and Computer vision.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Toward Automated Dynamic Malware Analysis Using CWSandbox

C. Willems;T. Holz;F. Freiling.
ieee symposium on security and privacy (2007)

1044 Citations

Learning and Classification of Malware Behavior

Konrad Rieck;Thorsten Holz;Carsten Willems;Patrick Düssel.
international conference on detection of intrusions and malware and vulnerability assessment (2008)

729 Citations

Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm

Thorsten Holz;Moritz Steiner;Frederic Dahl;Ernst Biersack.
LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats (2008)

589 Citations

Virtual Honeypots: From Botnet Tracking to Intrusion Detection

Niels Provos;Thorsten Holz.
(2007)

563 Citations

Rishi: identify bot contaminated hosts by IRC nickname evaluation

Jan Goebel;Thorsten Holz.
conference on workshop on hot topics in understanding botnets (2007)

536 Citations

The nepenthes platform: an efficient approach to collect malware

Paul Baecher;Markus Koetter;Thorsten Holz;Maximillian Dornseif.
recent advances in intrusion detection (2006)

500 Citations

Measuring and Detecting Fast-Flux Service Networks

Thorsten Holz;Christian Gorecki;Konrad Rieck;Felix C. Freiling.
network and distributed system security symposium (2008)

489 Citations

Botnet tracking: exploring a root-cause methodology to prevent distributed denial-of-service attacks

Felix C. Freiling;Thorsten Holz;Georg Wicherski.
european symposium on research in computer security (2005)

461 Citations

A Practical Attack to De-anonymize Social Network Users

Gilbert Wondracek;Thorsten Holz;Engin Kirda;Christopher Kruegel.
ieee symposium on security and privacy (2010)

423 Citations

Practical Timing Side Channel Attacks against Kernel Space ASLR

R. Hund;C. Willems;T. Holz.
ieee symposium on security and privacy (2013)

391 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Thorsten Holz

Christopher Kruegel

Christopher Kruegel

University of California, Santa Barbara

Publications: 48

Herbert Bos

Herbert Bos

Vrije Universiteit Amsterdam

Publications: 45

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

TU Darmstadt

Publications: 44

Wenke Lee

Wenke Lee

Georgia Institute of Technology

Publications: 44

Giovanni Vigna

Giovanni Vigna

University of California, Santa Barbara

Publications: 35

Lucas Davi

Lucas Davi

University of Duisburg-Essen

Publications: 34

Engin Kirda

Engin Kirda

Northeastern University

Publications: 33

Michalis Polychronakis

Michalis Polychronakis

Stony Brook University

Publications: 33

Gianluca Stringhini

Gianluca Stringhini

Boston University

Publications: 28

Dawn Song

Dawn Song

University of California, Berkeley

Publications: 27

Angelos D. Keromytis

Angelos D. Keromytis

Georgia Institute of Technology

Publications: 26

Mathias Payer

Mathias Payer

École Polytechnique Fédérale de Lausanne

Publications: 26

Zhiqiang Lin

Zhiqiang Lin

The Ohio State University

Publications: 25

Xuxian Jiang

Xuxian Jiang

PeckShield

Publications: 25

Davide Balzarotti

Davide Balzarotti

EURECOM

Publications: 24

Something went wrong. Please try again later.