D-Index & Metrics Best Publications
Computer Science
Germany
2023

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 62 Citations 16,235 245 World Ranking 1847 National Ranking 71

Research.com Recognitions

Awards & Achievements

2023 - Research.com Computer Science in Germany Leader Award

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • The Internet
  • Computer security

The scientist’s investigation covers issues in Computer security, Botnet, Malware, Internet privacy and Software. His Computer security research incorporates elements of Denial-of-service attack, The Internet and World Wide Web. His Fast flux study in the realm of The Internet interacts with subjects such as Mobile search.

Thorsten Holz has included themes like Machine learning and Computer virus in his Malware study. The various areas that Thorsten Holz examines in his Internet privacy study include Social spam, Web page, Contextual advertising and Forum spam. The concepts of his Software study are interwoven with issues in Executable, Trojan, Intermediate language, Source code and Discriminative model.

His most cited work include:

  • Toward Automated Dynamic Malware Analysis Using CWSandbox (640 citations)
  • Learning and Classification of Malware Behavior (458 citations)
  • The nepenthes platform: an efficient approach to collect malware (428 citations)

What are the main themes of his work throughout his whole career to date?

Thorsten Holz mainly focuses on Computer security, The Internet, Malware, Software and Internet privacy. His research in Computer security intersects with topics in World Wide Web and Botnet. Thorsten Holz interconnects Computer network and Server in the investigation of issues within The Internet.

His Software research incorporates themes from Code and Source code. Thorsten Holz combines subjects such as Executable and Memory corruption with his study of Source code. His Internet privacy research is multidisciplinary, incorporating elements of Transparency, General Data Protection Regulation and Online advertising.

He most often published in these fields:

  • Computer security (48.57%)
  • The Internet (15.10%)
  • Malware (14.29%)

What were the highlights of his more recent work (between 2017-2021)?

  • Computer security (48.57%)
  • Internet privacy (12.65%)
  • Memory corruption (6.53%)

In recent papers he was focusing on the following fields of study:

His primary areas of study are Computer security, Internet privacy, Memory corruption, General Data Protection Regulation and Programming language. His Computer security study frequently draws connections to adjacent fields such as Class. His biological study spans a wide range of topics, including Online advertising, Transparency and Personalization.

His work carried out in the field of Memory corruption brings together such families of science as Embedded system and Source code. His work deals with themes such as Subject access, Framing and Personally identifiable information, which intersect with General Data Protection Regulation. His work focuses on many connections between Pointer and other disciplines, such as Software, that overlap with his field of interest in Machine learning, Function pointer, Virtual function and Artificial intelligence.

Between 2017 and 2021, his most popular works were:

  • Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding. (70 citations)
  • (Un)informed Consent: Studying GDPR Consent Notices in the Field (67 citations)
  • REDQUEEN: Fuzzing with Input-to-State Correspondence. (61 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • The Internet
  • Programming language

His main research concerns Internet privacy, Computer security, General Data Protection Regulation, Fuzz testing and Artificial intelligence. His Internet privacy study combines topics from a wide range of disciplines, such as Adware, Malware and Personalization. In his research, he undertakes multidisciplinary study on Computer security and Mobile telephony.

His General Data Protection Regulation research also works with subjects such as

  • Transparency, which have a strong connection to The Internet, Internet security, Implementation and Subject access,
  • Online advertising that intertwine with fields like Data access, Subject, Personally identifiable information and Sharing economy. He has researched Fuzz testing in several fields, including Theoretical computer science and State. His Artificial intelligence research includes elements of Frequency analysis and Computer vision.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Toward Automated Dynamic Malware Analysis Using CWSandbox

C. Willems;T. Holz;F. Freiling.
ieee symposium on security and privacy (2007)

1114 Citations

Learning and Classification of Malware Behavior

Konrad Rieck;Thorsten Holz;Carsten Willems;Patrick Düssel.
international conference on detection of intrusions and malware and vulnerability assessment (2008)

773 Citations

Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm

Thorsten Holz;Moritz Steiner;Frederic Dahl;Ernst Biersack.
LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats (2008)

603 Citations

Virtual Honeypots: From Botnet Tracking to Intrusion Detection

Niels Provos;Thorsten Holz.
(2007)

581 Citations

Rishi: identify bot contaminated hosts by IRC nickname evaluation

Jan Goebel;Thorsten Holz.
conference on workshop on hot topics in understanding botnets (2007)

551 Citations

Measuring and Detecting Fast-Flux Service Networks

Thorsten Holz;Christian Gorecki;Konrad Rieck;Felix C. Freiling.
network and distributed system security symposium (2008)

549 Citations

The nepenthes platform : An efficient approach to collect malware

Paul Baecher;Markus Koetter;Thorsten Holz;Maximillian Dornseif.
Lecture Notes in Computer Science (2006)

512 Citations

A Practical Attack to De-anonymize Social Network Users

Gilbert Wondracek;Thorsten Holz;Engin Kirda;Christopher Kruegel.
ieee symposium on security and privacy (2010)

482 Citations

Botnet tracking: exploring a root-cause methodology to prevent distributed denial-of-service attacks

Felix C. Freiling;Thorsten Holz;Georg Wicherski.
european symposium on research in computer security (2005)

465 Citations

Practical Timing Side Channel Attacks against Kernel Space ASLR

R. Hund;C. Willems;T. Holz.
ieee symposium on security and privacy (2013)

437 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Thorsten Holz

Christopher Kruegel

Christopher Kruegel

University of California, Santa Barbara

Publications: 48

Herbert Bos

Herbert Bos

Vrije Universiteit Amsterdam

Publications: 45

Wenke Lee

Wenke Lee

Georgia Institute of Technology

Publications: 44

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

Technical University of Darmstadt

Publications: 44

Giovanni Vigna

Giovanni Vigna

University of California, Santa Barbara

Publications: 35

Lucas Davi

Lucas Davi

University of Duisburg-Essen

Publications: 34

Engin Kirda

Engin Kirda

Northeastern University

Publications: 33

Michalis Polychronakis

Michalis Polychronakis

Stony Brook University

Publications: 33

Christian Rossow

Christian Rossow

Saarland University

Publications: 32

Gianluca Stringhini

Gianluca Stringhini

Boston University

Publications: 28

Dawn Song

Dawn Song

University of California, Berkeley

Publications: 27

Angelos D. Keromytis

Angelos D. Keromytis

Georgia Institute of Technology

Publications: 26

Mathias Payer

Mathias Payer

École Polytechnique Fédérale de Lausanne

Publications: 26

Zhiqiang Lin

Zhiqiang Lin

The Ohio State University

Publications: 25

Xuxian Jiang

Xuxian Jiang

PeckShield

Publications: 25

Davide Balzarotti

Davide Balzarotti

EURECOM

Publications: 24

Trending Scientists

Robert M. Guralnick

Robert M. Guralnick

University of Southern California

Vera Pless

Vera Pless

University of Illinois at Chicago

Aleksander Weron

Aleksander Weron

Wrocław University of Science and Technology

Elaine Cohen

Elaine Cohen

University of Utah

George N. Somero

George N. Somero

Stanford University

Terry D. Oberley

Terry D. Oberley

University of Wisconsin–Madison

Gerhard Adam

Gerhard Adam

University of Natural Resources and Life Sciences

Lorella Francalanci

Lorella Francalanci

University of Florence

Malcolm Roberts

Malcolm Roberts

Met Office

Liesbeth Kester

Liesbeth Kester

Utrecht University

David J. Burn

David J. Burn

Newcastle University

Kazuichi Okazaki

Kazuichi Okazaki

Kansai Medical University

Bruce Cohen

Bruce Cohen

Northwestern University

Mel Ainscow

Mel Ainscow

University of Manchester

Gregory J. Herczeg

Gregory J. Herczeg

Peking University

Something went wrong. Please try again later.