2023 - Research.com Computer Science in Germany Leader Award
The scientist’s investigation covers issues in Computer security, Botnet, Malware, Internet privacy and Software. His Computer security research incorporates elements of Denial-of-service attack, The Internet and World Wide Web. His Fast flux study in the realm of The Internet interacts with subjects such as Mobile search.
Thorsten Holz has included themes like Machine learning and Computer virus in his Malware study. The various areas that Thorsten Holz examines in his Internet privacy study include Social spam, Web page, Contextual advertising and Forum spam. The concepts of his Software study are interwoven with issues in Executable, Trojan, Intermediate language, Source code and Discriminative model.
Thorsten Holz mainly focuses on Computer security, The Internet, Malware, Software and Internet privacy. His research in Computer security intersects with topics in World Wide Web and Botnet. Thorsten Holz interconnects Computer network and Server in the investigation of issues within The Internet.
His Software research incorporates themes from Code and Source code. Thorsten Holz combines subjects such as Executable and Memory corruption with his study of Source code. His Internet privacy research is multidisciplinary, incorporating elements of Transparency, General Data Protection Regulation and Online advertising.
His primary areas of study are Computer security, Internet privacy, Memory corruption, General Data Protection Regulation and Programming language. His Computer security study frequently draws connections to adjacent fields such as Class. His biological study spans a wide range of topics, including Online advertising, Transparency and Personalization.
His work carried out in the field of Memory corruption brings together such families of science as Embedded system and Source code. His work deals with themes such as Subject access, Framing and Personally identifiable information, which intersect with General Data Protection Regulation. His work focuses on many connections between Pointer and other disciplines, such as Software, that overlap with his field of interest in Machine learning, Function pointer, Virtual function and Artificial intelligence.
His main research concerns Internet privacy, Computer security, General Data Protection Regulation, Fuzz testing and Artificial intelligence. His Internet privacy study combines topics from a wide range of disciplines, such as Adware, Malware and Personalization. In his research, he undertakes multidisciplinary study on Computer security and Mobile telephony.
His General Data Protection Regulation research also works with subjects such as
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Toward Automated Dynamic Malware Analysis Using CWSandbox
C. Willems;T. Holz;F. Freiling.
ieee symposium on security and privacy (2007)
Learning and Classification of Malware Behavior
Konrad Rieck;Thorsten Holz;Carsten Willems;Patrick Düssel.
international conference on detection of intrusions and malware and vulnerability assessment (2008)
Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm
Thorsten Holz;Moritz Steiner;Frederic Dahl;Ernst Biersack.
LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats (2008)
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Niels Provos;Thorsten Holz.
Rishi: identify bot contaminated hosts by IRC nickname evaluation
Jan Goebel;Thorsten Holz.
conference on workshop on hot topics in understanding botnets (2007)
Measuring and Detecting Fast-Flux Service Networks
Thorsten Holz;Christian Gorecki;Konrad Rieck;Felix C. Freiling.
network and distributed system security symposium (2008)
The nepenthes platform : An efficient approach to collect malware
Paul Baecher;Markus Koetter;Thorsten Holz;Maximillian Dornseif.
Lecture Notes in Computer Science (2006)
A Practical Attack to De-anonymize Social Network Users
Gilbert Wondracek;Thorsten Holz;Engin Kirda;Christopher Kruegel.
ieee symposium on security and privacy (2010)
Botnet tracking: exploring a root-cause methodology to prevent distributed denial-of-service attacks
Felix C. Freiling;Thorsten Holz;Georg Wicherski.
european symposium on research in computer security (2005)
Practical Timing Side Channel Attacks against Kernel Space ASLR
R. Hund;C. Willems;T. Holz.
ieee symposium on security and privacy (2013)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: