Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Maximillian Dornseif
@inproceedings{DBLP:conf/imf/DaiyaDF07, author = {Harish Daiya and Maximillian Dornseif and Felix C. Freiling}, editor = {Sandra Frings and Oliver G{\"{o}}bel and Detlef G{\"{u}}nther and Hardo Hase and Jens Nedon and Dirk Schadt and Arslan Br{\"{o}}mme}, title = {Testing Forensic Hash Tools on Sparse Files}, booktitle = {IT-Incidents Management {\&} IT-Forensics - {IMF} 2007, Conference Proceedings, September 11-13, 2007, Stuttgart, Germany}, series = {{LNI}}, volume = {{P-114}}, pages = {113--123}, publisher = {{GI}}, year = {2007}, url = {https://dl.gi.de/handle/20.500.12116/22389}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imf/DaiyaDF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imf/AndersonDFHILM06, author = {Philip Anderson and Maximillian Dornseif and Felix C. Freiling and Thorsten Holz and Alastair Irons and Christopher Laing and Martin Mink}, editor = {Oliver G{\"{o}}bel and Dirk Schadt and Sandra Frings and Hardo Hase and Detlef G{\"{u}}nther and Jens Nedon}, title = {A Comparative Study of Teaching Forensics at a University Degree Level}, booktitle = {IT-Incidents Management {\&} IT-Forensics - {IMF} 2006, Conference Proceedings, October, 18th-19th, 2006, Stuttgart}, series = {{LNI}}, volume = {{P-97}}, pages = {116--127}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/23454}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imf/AndersonDFHILM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BaecherKHDF06, author = {Paul Baecher and Markus Koetter and Thorsten Holz and Maximillian Dornseif and Felix C. Freiling}, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {The Nepenthes Platform: An Efficient Approach to Collect Malware}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, pages = {165--184}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214\_9}, doi = {10.1007/11856214\_9}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BaecherKHDF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BecherBD06, author = {Alexander Becher and Zinaida Benenson and Maximillian Dornseif}, editor = {Jana Dittmann}, title = {Tampering with Motes: Real-World Attacks on Wireless Sensor Networks}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {26--29}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24799}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BecherBD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/BecherBD06, author = {Alexander Becher and Zinaida Benenson and Maximillian Dornseif}, editor = {John A. Clark and Richard F. Paige and Fiona Polack and Phillip J. Brooke}, title = {Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks}, booktitle = {Security in Pervasive Computing, Third International Conference, {SPC} 2006, York, UK, April 18-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3934}, pages = {104--118}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734666\_9}, doi = {10.1007/11734666\_9}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spc/BecherBD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dfn/DornseifHM05, author = {Maximillian Dornseif and Thorsten Holz and Sven M{\"{u}}ller}, editor = {Jan von Knop and Wilhelm Haverkamp and Eike Jessen}, title = {Honeypots and Limitations of Deception}, booktitle = {"Heute schon das Morgen sehen", 19. DFN-Arbeitstagung {\"{u}}ber Kommunikationsnetze, D{\"{u}}sseldorf, 2004}, series = {{LNI}}, volume = {{P-73}}, pages = {235--252}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28613}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dfn/DornseifHM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pik/DornseifGH04, author = {Maximillian Dornseif and Felix C. G{\"{a}}rtner and Thorsten Holz}, title = {Vulnerability Assessment using Honeypots}, journal = {Prax. Inf.verarb. Kommun.}, volume = {27}, number = {4}, pages = {195--201}, year = {2004}, url = {https://doi.org/10.1515/PIKO.2004.195}, doi = {10.1515/PIKO.2004.195}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pik/DornseifGH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/DornseifGH04, author = {Maximillian Dornseif and Felix C. G{\"{a}}rtner and Thorsten Holz}, editor = {Ulrich Flegel and Michael Meier}, title = {Ermittlung von Verwundbarkeiten mit elektronischen K{\"{o}}dern}, booktitle = {Detection of Intrusions and Malware {\&} Vulnerability Assessment, {GI} {SIG} {SIDAR} Workshop, {DIMVA} 2004, Dortmund, Germany, July 6.7, 2004, Proceedings}, series = {{LNI}}, volume = {{P-46}}, pages = {129--141}, publisher = {{GI}}, year = {2004}, url = {https://dl.gi.de/handle/20.500.12116/29211}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/DornseifGH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CR-0406052, author = {Maximillian Dornseif and Thorsten Holz and Christian N. Klein}, title = {NoSEBrEaK - Attacking Honeynets}, journal = {CoRR}, volume = {cs.CR/0406052}, year = {2004}, url = {http://arxiv.org/abs/cs/0406052}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-CR-0406052.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CR-0406057, author = {Maximillian Dornseif and Sascha May}, title = {Modelling the costs and benefits of Honeynets}, journal = {CoRR}, volume = {cs.CR/0406057}, year = {2004}, url = {http://arxiv.org/abs/cs/0406057}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-CR-0406057.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CR-0406059, author = {Maximillian Dornseif and Felix C. G{\"{a}}rtner and Thorsten Holz}, title = {Ermittlung von Verwundbarkeiten mit elektronischen Koedern}, journal = {CoRR}, volume = {cs.CR/0406059}, year = {2004}, url = {http://arxiv.org/abs/cs/0406059}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-CR-0406059.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CY-0404005, author = {Maximillian Dornseif}, title = {Government mandated blocking of foreign Web content}, journal = {CoRR}, volume = {cs.CY/0404005}, year = {2004}, url = {http://arxiv.org/abs/cs/0404005}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-CY-0404005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dfn/Dornseif03, author = {Maximillian Dornseif}, editor = {Jan von Knop and Wilhelm Haverkamp and Eike Jessen}, title = {Government mandated blocking of foreign Web content}, booktitle = {Security, E-Learning, E-Services, 17. DFN-Arbeitstagung {\"{u}}ber Kommunikationsnetze, D{\"{u}}sseldorf, 2003}, series = {{LNI}}, volume = {{P-44}}, pages = {617--647}, publisher = {{GI}}, year = {2003}, url = {https://dl.gi.de/handle/20.500.12116/29307}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dfn/Dornseif03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DornseifSK02, author = {Maximillian Dornseif and Kay H. Schumann and Christian N. Klein}, title = {Tats{\"{a}}chliche und rechtliche Risiken drahtloser Computernetzwerke}, journal = {Datenschutz und Datensicherheit}, volume = {26}, number = {4}, year = {2002}, timestamp = {Wed, 30 Aug 2006 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/DornseifSK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CY-0204021, author = {Maximillian Dornseif and Kay H. Schumann and Christian N. Klein}, title = {Factual and Legal Risks regarding wireless Computer Networks}, journal = {CoRR}, volume = {cs.CY/0204021}, year = {2002}, url = {https://arxiv.org/abs/cs/0204021}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-CY-0204021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.