BibTeX records: Maximillian Dornseif

download as .bib file

@inproceedings{DBLP:conf/imf/DaiyaDF07,
  author       = {Harish Daiya and
                  Maximillian Dornseif and
                  Felix C. Freiling},
  editor       = {Sandra Frings and
                  Oliver G{\"{o}}bel and
                  Detlef G{\"{u}}nther and
                  Hardo Hase and
                  Jens Nedon and
                  Dirk Schadt and
                  Arslan Br{\"{o}}mme},
  title        = {Testing Forensic Hash Tools on Sparse Files},
  booktitle    = {IT-Incidents Management {\&} IT-Forensics - {IMF} 2007, Conference
                  Proceedings, September 11-13, 2007, Stuttgart, Germany},
  series       = {{LNI}},
  volume       = {{P-114}},
  pages        = {113--123},
  publisher    = {{GI}},
  year         = {2007},
  url          = {https://dl.gi.de/handle/20.500.12116/22389},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imf/DaiyaDF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imf/AndersonDFHILM06,
  author       = {Philip Anderson and
                  Maximillian Dornseif and
                  Felix C. Freiling and
                  Thorsten Holz and
                  Alastair Irons and
                  Christopher Laing and
                  Martin Mink},
  editor       = {Oliver G{\"{o}}bel and
                  Dirk Schadt and
                  Sandra Frings and
                  Hardo Hase and
                  Detlef G{\"{u}}nther and
                  Jens Nedon},
  title        = {A Comparative Study of Teaching Forensics at a University Degree Level},
  booktitle    = {IT-Incidents Management {\&} IT-Forensics - {IMF} 2006, Conference
                  Proceedings, October, 18th-19th, 2006, Stuttgart},
  series       = {{LNI}},
  volume       = {{P-97}},
  pages        = {116--127},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/23454},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imf/AndersonDFHILM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BaecherKHDF06,
  author       = {Paul Baecher and
                  Markus Koetter and
                  Thorsten Holz and
                  Maximillian Dornseif and
                  Felix C. Freiling},
  editor       = {Diego Zamboni and
                  Christopher Kr{\"{u}}gel},
  title        = {The Nepenthes Platform: An Efficient Approach to Collect Malware},
  booktitle    = {Recent Advances in Intrusion Detection, 9th International Symposium,
                  {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  pages        = {165--184},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11856214\_9},
  doi          = {10.1007/11856214\_9},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BaecherKHDF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BecherBD06,
  author       = {Alexander Becher and
                  Zinaida Benenson and
                  Maximillian Dornseif},
  editor       = {Jana Dittmann},
  title        = {Tampering with Motes: Real-World Attacks on Wireless Sensor Networks},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {26--29},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24799},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BecherBD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/BecherBD06,
  author       = {Alexander Becher and
                  Zinaida Benenson and
                  Maximillian Dornseif},
  editor       = {John A. Clark and
                  Richard F. Paige and
                  Fiona Polack and
                  Phillip J. Brooke},
  title        = {Tampering with Motes: Real-World Physical Attacks on Wireless Sensor
                  Networks},
  booktitle    = {Security in Pervasive Computing, Third International Conference, {SPC}
                  2006, York, UK, April 18-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3934},
  pages        = {104--118},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734666\_9},
  doi          = {10.1007/11734666\_9},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/BecherBD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dfn/DornseifHM05,
  author       = {Maximillian Dornseif and
                  Thorsten Holz and
                  Sven M{\"{u}}ller},
  editor       = {Jan von Knop and
                  Wilhelm Haverkamp and
                  Eike Jessen},
  title        = {Honeypots and Limitations of Deception},
  booktitle    = {"Heute schon das Morgen sehen", 19. DFN-Arbeitstagung {\"{u}}ber
                  Kommunikationsnetze, D{\"{u}}sseldorf, 2004},
  series       = {{LNI}},
  volume       = {{P-73}},
  pages        = {235--252},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28613},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dfn/DornseifHM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pik/DornseifGH04,
  author       = {Maximillian Dornseif and
                  Felix C. G{\"{a}}rtner and
                  Thorsten Holz},
  title        = {Vulnerability Assessment using Honeypots},
  journal      = {Prax. Inf.verarb. Kommun.},
  volume       = {27},
  number       = {4},
  pages        = {195--201},
  year         = {2004},
  url          = {https://doi.org/10.1515/PIKO.2004.195},
  doi          = {10.1515/PIKO.2004.195},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pik/DornseifGH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/DornseifGH04,
  author       = {Maximillian Dornseif and
                  Felix C. G{\"{a}}rtner and
                  Thorsten Holz},
  editor       = {Ulrich Flegel and
                  Michael Meier},
  title        = {Ermittlung von Verwundbarkeiten mit elektronischen K{\"{o}}dern},
  booktitle    = {Detection of Intrusions and Malware {\&} Vulnerability Assessment,
                  {GI} {SIG} {SIDAR} Workshop, {DIMVA} 2004, Dortmund, Germany, July
                  6.7, 2004, Proceedings},
  series       = {{LNI}},
  volume       = {{P-46}},
  pages        = {129--141},
  publisher    = {{GI}},
  year         = {2004},
  url          = {https://dl.gi.de/handle/20.500.12116/29211},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/DornseifGH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-CR-0406052,
  author       = {Maximillian Dornseif and
                  Thorsten Holz and
                  Christian N. Klein},
  title        = {NoSEBrEaK - Attacking Honeynets},
  journal      = {CoRR},
  volume       = {cs.CR/0406052},
  year         = {2004},
  url          = {http://arxiv.org/abs/cs/0406052},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-CR-0406052.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-CR-0406057,
  author       = {Maximillian Dornseif and
                  Sascha May},
  title        = {Modelling the costs and benefits of Honeynets},
  journal      = {CoRR},
  volume       = {cs.CR/0406057},
  year         = {2004},
  url          = {http://arxiv.org/abs/cs/0406057},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-CR-0406057.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-CR-0406059,
  author       = {Maximillian Dornseif and
                  Felix C. G{\"{a}}rtner and
                  Thorsten Holz},
  title        = {Ermittlung von Verwundbarkeiten mit elektronischen Koedern},
  journal      = {CoRR},
  volume       = {cs.CR/0406059},
  year         = {2004},
  url          = {http://arxiv.org/abs/cs/0406059},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-CR-0406059.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-CY-0404005,
  author       = {Maximillian Dornseif},
  title        = {Government mandated blocking of foreign Web content},
  journal      = {CoRR},
  volume       = {cs.CY/0404005},
  year         = {2004},
  url          = {http://arxiv.org/abs/cs/0404005},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-CY-0404005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dfn/Dornseif03,
  author       = {Maximillian Dornseif},
  editor       = {Jan von Knop and
                  Wilhelm Haverkamp and
                  Eike Jessen},
  title        = {Government mandated blocking of foreign Web content},
  booktitle    = {Security, E-Learning, E-Services, 17. DFN-Arbeitstagung {\"{u}}ber
                  Kommunikationsnetze, D{\"{u}}sseldorf, 2003},
  series       = {{LNI}},
  volume       = {{P-44}},
  pages        = {617--647},
  publisher    = {{GI}},
  year         = {2003},
  url          = {https://dl.gi.de/handle/20.500.12116/29307},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dfn/Dornseif03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DornseifSK02,
  author       = {Maximillian Dornseif and
                  Kay H. Schumann and
                  Christian N. Klein},
  title        = {Tats{\"{a}}chliche und rechtliche Risiken drahtloser Computernetzwerke},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {26},
  number       = {4},
  year         = {2002},
  timestamp    = {Wed, 30 Aug 2006 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/DornseifSK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-CY-0204021,
  author       = {Maximillian Dornseif and
                  Kay H. Schumann and
                  Christian N. Klein},
  title        = {Factual and Legal Risks regarding wireless Computer Networks},
  journal      = {CoRR},
  volume       = {cs.CY/0204021},
  year         = {2002},
  url          = {https://arxiv.org/abs/cs/0204021},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-CY-0204021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics