<?xml version="1.0"?>
<dblpperson name="Felix C. Freiling" pid="f/FCFreiling" n="270">
<person key="homepages/f/FCFreiling" mdate="2024-05-01">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<note type="affiliation">University of Erlangen-Nuremberg, Germany</note>
<url>http://www1.informatik.uni-erlangen.de/staff/freiling</url>
<url>https://scholar.google.com/citations?user=tL5yFPUAAAAJ</url>
<url>https://zbmath.org/authors/?q=ai:freiling.felix-c</url>
<url>https://mathgenealogy.org/id.php?id=133675</url>
<url>https://orcid.org/0000-0002-8279-8401</url>
<url>https://www.wikidata.org/entity/Q102349172</url>
<url>https://id.loc.gov/authorities/names/no2008098846</url>
<url>https://d-nb.info/gnd/123244919</url>
</person>
<r><inproceedings key="conf/dfds/HoppmannLSFB26" mdate="2026-03-31">
<author orcid="0009-0000-0971-6636" pid="429/9298">Tobias Hoppmann</author>
<author orcid="0000-0001-8309-3211" pid="301/5833">Leona Lassak</author>
<author orcid="0000-0003-1823-5505" pid="s/MASasse">M. Angela Sasse</author>
<author orcid="0000-0002-8279-8401" pid="f/FCFreiling">Felix C. Freiling</author>
<author orcid="0009-0006-7158-0219" pid="b/ZBenenson">Zinaida Benenson</author>
<title>Defining the Usability of Digital Forensics in Criminal Proceedings: Reconciling the Technical and the Legal Sides.</title>
<pages>5:1-5:8</pages>
<year>2026</year>
<booktitle>DFDS</booktitle>
<ee>https://doi.org/10.1145/3785318.3785324</ee>
<crossref>conf/dfds/2026</crossref>
<url>db/conf/dfds/dfds2026.html#HoppmannLSFB26</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sicherheit/EichhornLF26" mdate="2026-03-18">
<author pid="326/2414">Maximilian Eichhorn</author>
<author pid="429/6164">Carolin L&#228;mmle</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Experimentelle Evaluation kosteng&#252;nstiger Techniken zur physischen Datentr&#228;gerzerst&#246;rung.</title>
<pages>91-102</pages>
<year>2026</year>
<booktitle>Sicherheit</booktitle>
<ee type="oa">https://doi.org/10.18420/sicherheit2026_08</ee>
<crossref>conf/sicherheit/2026</crossref>
<url>db/conf/sicherheit/sicherheit2026.html#EichhornLF26</url>
</inproceedings>
</r>
<r><article key="journals/di/RzepkaOSFB25" mdate="2025-04-30">
<author pid="390/2834">Lisa Rzepka</author>
<author pid="229/0013">Jenny Ottmann</author>
<author pid="270/4026">Radina Stoykova</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="20/151">Harald Baier</author>
<title>A scenario-based quality assessment of memory acquisition tools and its investigative implications.</title>
<pages>301868</pages>
<year>2025</year>
<volume>52</volume>
<journal>Digit. Investig.</journal>
<number>Supplement</number>
<ee>https://doi.org/10.1016/j.fsidi.2025.301868</ee>
<url>db/journals/di/di52.html#RzepkaOSFB25</url>
</article>
</r>
<r><article key="journals/di/VoigtFH25" mdate="2025-09-06">
<author pid="330/8697">Lena L. Voigt</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author orcid="0009-0008-1088-8302" pid="07/5792">Christopher Hargreaves</author>
<title>A metrics-based look at disk images: Insights and applications.</title>
<pages>301874</pages>
<year>2025</year>
<volume>52</volume>
<journal>Digit. Investig.</journal>
<number>Supplement</number>
<ee>https://doi.org/10.1016/j.fsidi.2025.301874</ee>
<url>db/journals/di/di52.html#VoigtFH25</url>
</article>
</r>
<r><article key="journals/dtrap/SchmidBF25" mdate="2026-02-03">
<author orcid="0009-0001-6585-2234" pid="314/2884">Kerstin Schmid</author>
<author orcid="0009-0004-7880-6618" pid="424/0893">Konstantin Bayreuther</author>
<author orcid="0000-0002-8279-8401" pid="f/FCFreiling">Felix C. Freiling</author>
<title>Limits to the Forensic Analysis of Container Applications in Cloud Environments.</title>
<pages>26:1-26:20</pages>
<year>2025</year>
<month>December</month>
<volume>6</volume>
<journal>Digit. Threat. Res. Pract.</journal>
<number>4</number>
<ee>https://doi.org/10.1145/3765629</ee>
<url>db/journals/dtrap/dtrap6.html#SchmidBF25</url>
<stream>streams/journals/dtrap</stream>
</article>
</r>
<r><article key="journals/dtrap/PohlVHFF25" mdate="2026-02-03">
<author orcid="0009-0001-0189-7409" pid="424/0574">Niclas Pohl</author>
<author orcid="0009-0009-8409-2136" pid="330/8697">Lena L. Voigt</author>
<author orcid="0009-0008-1088-8302" pid="07/5792">Christopher Hargreaves</author>
<author orcid="0009-0003-5073-6972" pid="170/2701">Christofer Fein</author>
<author orcid="0000-0002-8279-8401" pid="f/FCFreiling">Felix C. Freiling</author>
<title>DiskForge: Timestomping on Disk Images for Educational Benefit.</title>
<pages>28:1-28:20</pages>
<year>2025</year>
<month>December</month>
<volume>6</volume>
<journal>Digit. Threat. Res. Pract.</journal>
<number>4</number>
<ee>https://doi.org/10.1145/3748265</ee>
<url>db/journals/dtrap/dtrap6.html#PohlVHFF25</url>
<stream>streams/journals/dtrap</stream>
</article>
</r>
<r><article key="journals/tdsc/AbdullahFS25" mdate="2025-10-14">
<author orcid="0000-0002-6237-7378" pid="211/3348">Lamya Abdullah</author>
<author orcid="0000-0002-8279-8401" pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="52/6199">Dominique Schr&#246;der</author>
<title>Increasing the Resilience of Secure Multiparty Computation Using Security Modules.</title>
<pages>4711-4721</pages>
<year>2025</year>
<month>September - October</month>
<volume>22</volume>
<journal>IEEE Trans. Dependable Secur. Comput.</journal>
<number>5</number>
<ee>https://doi.org/10.1109/TDSC.2025.3552670</ee>
<url>db/journals/tdsc/tdsc22.html#AbdullahFS25</url>
<stream>streams/journals/tdsc</stream>
</article>
</r>
<r><article key="journals/tdsc/SchneiderFLEMWSDFHHMMW25" mdate="2025-12-26">
<author orcid="0000-0002-7309-6440" pid="297/8832">Janine Schneider</author>
<author orcid="0000-0002-6393-5888" pid="210/3254">Aya Fukami</author>
<author orcid="0009-0000-1560-7559" pid="408/3594">Immanuel Lautner</author>
<author orcid="0009-0001-5284-8455" pid="326/2414">Maximilian Eichhorn</author>
<author orcid="0000-0002-1390-9198" pid="305/3934">Denise Moussa</author>
<author orcid="0000-0001-5430-4331" pid="66/7497-3">Julian Wolf 0003</author>
<author pid="297/8741">Nicole Scheler</author>
<author pid="216/3907">Dominic Deuber</author>
<author orcid="0000-0002-8279-8401" pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="408/2156">Jaap Haasnoot</author>
<author pid="52/8918">Hans Henseler</author>
<author pid="305/9955">Simon Malik</author>
<author orcid="0000-0002-9032-1312" pid="31/7693">Holger Morgenstern</author>
<author orcid="0009-0005-1224-5210" pid="408/3247">Martin Westman</author>
<title>Poor Sanitization Practices and Questionable Digital Evidence: A Comprehensive Study of Scope and Impact of Recycled NAND Flash Chips.</title>
<pages>5970-5984</pages>
<year>2025</year>
<month>November - December</month>
<volume>22</volume>
<journal>IEEE Trans. Dependable Secur. Comput.</journal>
<number>6</number>
<ee>https://doi.org/10.1109/TDSC.2025.3579237</ee>
<url>db/journals/tdsc/tdsc22.html#SchneiderFLEMWSDFHHMMW25</url>
<stream>streams/journals/tdsc</stream>
</article>
</r>
<r><inproceedings key="conf/acsac/SchulzeBRF25" mdate="2026-03-24">
<author pid="384/6111">Matti Schulze</author>
<author orcid="0009-0006-1844-8446" pid="207/7685">Paul Bergmann</author>
<author pid="249/4099">Jonas R&#246;ckl</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>TrustLeech: Privileged System Analysis using Nested Virtualization.</title>
<booktitle>ACSAC</booktitle>
<year>2025</year>
<pages>468-481</pages>
<crossref>conf/acsac/2025</crossref>
<ee>https://doi.org/10.1109/ACSAC67867.2025.00048</ee>
<url>db/conf/acsac/acsac2025.html#SchulzeBRF25</url>
<stream>streams/conf/acsac</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/dfds/VaniniGHBFB25" mdate="2026-01-20">
<author orcid="0000-0003-3690-8574" pid="374/7498">C&#233;line Vanini</author>
<author orcid="0000-0003-1862-2900" pid="76/11015-1">Jan Gruber 0001</author>
<author orcid="0009-0008-1088-8302" pid="07/5792">Christopher Hargreaves</author>
<author orcid="0009-0006-7158-0219" pid="b/ZBenenson">Zinaida Benenson</author>
<author orcid="0000-0002-8279-8401" pid="f/FCFreiling">Felix C. Freiling</author>
<author orcid="0000-0001-5261-4600" pid="66/9068">Frank Breitinger</author>
<title>Understanding Strategies and Challenges of Timestamp Tampering for Improved Digital Forensic Event Reconstruction.</title>
<pages>10:1-10:8</pages>
<year>2025</year>
<booktitle>DFDS</booktitle>
<ee>https://doi.org/10.1145/3712716.3712727</ee>
<crossref>conf/dfds/2025</crossref>
<url>db/conf/dfds/dfds2025.html#VaniniGHBFB25</url>
</inproceedings>
</r>
<r><data key="data/12/VaniniGHBBF25" mdate="2026-04-02">
<author orcid="0000-0003-3690-8574" pid="374/7498">C&#233;line Vanini</author>
<author orcid="0000-0003-1862-2900" pid="76/11015-1">Jan Gruber 0001</author>
<author orcid="0009-0003-0003-3320" pid="07/5792">Christopher Hargreaves</author>
<author orcid="0009-0006-7158-0219" pid="b/ZBenenson">Zinaida Benenson</author>
<author orcid="0000-0001-5261-4600" pid="66/9068">Frank Breitinger</author>
<author orcid="0000-0002-8279-8401" pid="f/FCFreiling">Felix C. Freiling</author>
<title>Guidelines and Questionnaires for a User Study on Live Timestamp Tampering in Digital Forensic Event Reconstruction.</title>
<publisher>Zenodo</publisher>
<year>2025</year>
<month>January</month>
<ee type="oa">https://doi.org/10.5281/zenodo.17064467</ee>
<stream>streams/repo/zenodo</stream>
<rel sort="1" label="Version 1.0" uri="https://doi.org/10.5281/zenodo.17064466" type="versionOf"></rel>
</data>
</r>
<r><article publtype="informal" key="journals/corr/abs-2501-00175" mdate="2026-01-20">
<author pid="374/7498">C&#233;line Vanini</author>
<author pid="76/11015-1">Jan Gruber 0001</author>
<author pid="07/5792">Christopher Hargreaves</author>
<author pid="b/ZBenenson">Zinaida Benenson</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="66/9068">Frank Breitinger</author>
<title>Strategies and Challenges of Timestamp Tampering for Improved Digital Forensic Event Reconstruction (extended version).</title>
<year>2025</year>
<month>January</month>
<volume>abs/2501.00175</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2501.00175</ee>
<url>db/journals/corr/corr2501.html#abs-2501-00175</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2505-05697" mdate="2025-06-23">
<author pid="217/6939">Tobias Latzo</author>
<author pid="277/2819">Florian Hantke</author>
<author pid="408/0091">Lukas Kotschi</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Bringing Forensic Readiness to Modern Computer Firmware.</title>
<year>2025</year>
<month>May</month>
<volume>abs/2505.05697</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2505.05697</ee>
<url>db/journals/corr/corr2505.html#abs-2505-05697</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2505-14067" mdate="2025-06-25">
<author pid="297/8832">Janine Schneider</author>
<author pid="408/3594">Immanuel Lautner</author>
<author pid="305/3934">Denise Moussa</author>
<author pid="66/7497-3">Julian Wolf 0003</author>
<author pid="297/8741">Nicole Scheler</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="408/2156">Jaap Haasnoot</author>
<author pid="52/8918">Hans Henseler</author>
<author pid="305/9955">Simon Malik</author>
<author pid="31/7693">Holger Morgenstern</author>
<author pid="408/3247">Martin Westman</author>
<title>In Search of Lost Data: A Study of Flash Sanitization Practices.</title>
<year>2025</year>
<month>May</month>
<volume>abs/2505.14067</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2505.14067</ee>
<url>db/journals/corr/corr2505.html#abs-2505-14067</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2505-15921" mdate="2025-06-25">
<author pid="229/0013">Jenny Ottmann</author>
<author pid="66/9068">Frank Breitinger</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Defining Atomicity (and Integrity) for Snapshots of Storage in Forensic Computing.</title>
<year>2025</year>
<month>May</month>
<volume>abs/2505.15921</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2505.15921</ee>
<url>db/journals/corr/corr2505.html#abs-2505-15921</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2511-12830" mdate="2026-01-14">
<author pid="423/5040">Joanna Klauser</author>
<author pid="155/4657">Bruno Albert</author>
<author pid="381/1579">Christian Lindenmeier</author>
<author pid="232/0279-3">Andreas Hammer 0003</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="08/9190">Dirk Heckmann</author>
<author pid="145/8667">Sabine Pfeiffer</author>
<title>Telekommunikations&#252;berwachung am Scheideweg: Zur Regulierbarkeit des Zugriffes auf verschl&#252;sselte Kommunikation.</title>
<year>2025</year>
<month>November</month>
<volume>abs/2511.12830</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2511.12830</ee>
<url>db/journals/corr/corr2511.html#abs-2511-12830</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article key="journals/di/EbbersGBFS24" mdate="2025-04-30">
<author orcid="0009-0008-7941-1633" pid="294/8819">Simon Ebbers</author>
<author pid="381/8790">Stefan Gense</author>
<author pid="381/7951">Mouad Bakkouch</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="43/11495">Sebastian Schinzel</author>
<title>Grand theft API: A forensic analysis of vehicle cloud data.</title>
<pages>301691</pages>
<year>2024</year>
<volume>48</volume>
<journal>Forensic Sci. Int. Digit. Investig.</journal>
<number>Supplement</number>
<ee>https://doi.org/10.1016/j.fsidi.2023.301691</ee>
<url>db/journals/di/di48.html#EbbersGBFS24</url>
<stream>streams/journals/di</stream>
</article>
</r>
<r><article key="journals/di/DreierVHBF24" mdate="2025-09-06">
<author orcid="0009-0009-8462-389X" pid="226/4514">Lisa Marie Dreier</author>
<author orcid="0000-0003-3690-8574" pid="374/7498">C&#233;line Vanini</author>
<author orcid="0009-0008-1088-8302" pid="07/5792">Christopher James Hargreaves</author>
<author orcid="0000-0001-5261-4600" pid="66/9068">Frank Breitinger</author>
<author orcid="0000-0002-8279-8401" pid="f/FCFreiling">Felix C. Freiling</author>
<title>Beyond timestamps: Integrating implicit timing information into digital forensic timelines.</title>
<pages>301755</pages>
<year>2024</year>
<volume>49</volume>
<journal>Forensic Sci. Int. Digit. Investig.</journal>
<number>Supplement</number>
<ee type="oa">https://doi.org/10.1016/j.fsidi.2024.301755</ee>
<url>db/journals/di/di49.html#DreierVHBF24</url>
<stream>streams/journals/di</stream>
</article>
</r>
<r><article key="journals/di/SavchenkoOF24" mdate="2025-04-30">
<author orcid="0009-0009-7195-4921" pid="381/8518">Ella Savchenko</author>
<author orcid="0000-0003-1090-0566" pid="229/0013">Jenny Ottmann</author>
<author orcid="0000-0002-8279-8401" pid="f/FCFreiling">Felix C. Freiling</author>
<title>In the time loop: Data remanence in main memory of virtual machines.</title>
<pages>301758</pages>
<year>2024</year>
<volume>49</volume>
<journal>Forensic Sci. Int. Digit. Investig.</journal>
<number>Supplement</number>
<ee type="oa">https://doi.org/10.1016/j.fsidi.2024.301758</ee>
<url>db/journals/di/di49.html#SavchenkoOF24</url>
<stream>streams/journals/di</stream>
</article>
</r>
<r><article key="journals/di/LindenmeierHGRF24" mdate="2026-01-20">
<author orcid="0000-0003-2369-2196" pid="381/1579">Christian Lindenmeier</author>
<author pid="232/0279-3">Andreas Hammer 0003</author>
<author orcid="0000-0003-1862-2900" pid="76/11015-1">Jan Gruber 0001</author>
<author pid="249/4099">Jonas R&#246;ckl</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Key extraction-based lawful access to encrypted data: Taxonomy and survey.</title>
<pages>301796</pages>
<year>2024</year>
<volume>50</volume>
<journal>Forensic Sci. Int. Digit. Investig.</journal>
<ee type="oa">https://doi.org/10.1016/j.fsidi.2024.301796</ee>
<url>db/journals/di/di50.html#LindenmeierHGRF24</url>
<stream>streams/journals/di</stream>
</article>
</r>
<r><article key="journals/di/VoigtFH24" mdate="2025-09-06">
<author pid="330/8697">Lena L. Voigt</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author orcid="0009-0008-1088-8302" pid="07/5792">Christopher James Hargreaves</author>
<title>Re-imagen: Generating coherent background activity in synthetic scenario-based forensic datasets using large language models.</title>
<pages>301805</pages>
<year>2024</year>
<volume>50</volume>
<journal>Digit. Investig.</journal>
<number>Supplement</number>
<ee>https://doi.org/10.1016/j.fsidi.2024.301805</ee>
<url>db/journals/di/di50.html#VoigtFH24</url>
</article>
</r>
<r><article key="journals/dtrap/LindenmeierGF24" mdate="2026-01-20">
<author orcid="0000-0003-2369-2196" pid="381/1579">Christian Lindenmeier</author>
<author orcid="0000-0003-1862-2900" pid="76/11015-1">Jan Gruber 0001</author>
<author orcid="0000-0002-8279-8401" pid="f/FCFreiling">Felix C. Freiling</author>
<title>InvesTEE: A TEE-supported Framework for Lawful Remote Forensic Investigations.</title>
<pages>27:1-27:20</pages>
<year>2024</year>
<volume>5</volume>
<journal>DTRAP</journal>
<number>3</number>
<ee>https://doi.org/10.1145/3680294</ee>
<ee>https://www.wikidata.org/entity/Q131114083</ee>
<url>db/journals/dtrap/dtrap5.html#LindenmeierGF24</url>
</article>
</r>
<r><article key="journals/dtrap/0003GNSFF24" mdate="2024-11-30">
<author orcid="0000-0001-5397-1685" pid="232/0279-3">Andreas Hammer 0003</author>
<author orcid="0009-0001-8270-1964" pid="253/1877">Julian Geus</author>
<author orcid="0009-0003-2074-4402" pid="373/4012">Florian Nicolai</author>
<author orcid="0009-0000-2754-951X" pid="134/3346">Philip Sch&#252;tz</author>
<author orcid="0009-0003-5073-6972" pid="170/2701">Christofer Fein</author>
<author orcid="0000-0002-8279-8401" pid="f/FCFreiling">Felix C. Freiling</author>
<title>Fit for Forensics: Taxonomy and Common Model for Forensic Analysis of Fitness Trackers.</title>
<pages>29:1-29:20</pages>
<year>2024</year>
<volume>5</volume>
<journal>DTRAP</journal>
<number>3</number>
<ee>https://doi.org/10.1145/3687271</ee>
<url>db/journals/dtrap/dtrap5.html#0003GNSFF24</url>
</article>
</r>
<r><article key="journals/dtrap/RzepkaOFB24" mdate="2025-01-19">
<author orcid="0009-0001-4918-7449" pid="390/2834">Lisa Rzepka</author>
<author orcid="0000-0003-1090-0566" pid="229/0013">Jenny Ottmann</author>
<author orcid="0000-0002-8279-8401" pid="f/FCFreiling">Felix C. Freiling</author>
<author orcid="0000-0002-9254-6398" pid="20/151">Harald Baier</author>
<title>Causal Inconsistencies Are Normal in Windows Memory Dumps (Too).</title>
<pages>31:1-31:20</pages>
<year>2024</year>
<volume>5</volume>
<journal>DTRAP</journal>
<number>3</number>
<ee>https://doi.org/10.1145/3680293</ee>
<ee>https://www.wikidata.org/entity/Q130948461</ee>
<url>db/journals/dtrap/dtrap5.html#RzepkaOFB24</url>
</article>
</r>
<r><article key="journals/dtrap/0003CJEF24" mdate="2025-01-19">
<author orcid="0000-0001-5397-1685" pid="232/0279-3">Andreas Hammer 0003</author>
<author orcid="0009-0004-7117-6609" pid="390/2755">Christian Cerny</author>
<author orcid="0009-0000-2942-6206" pid="67/6076">Christoph Jung</author>
<author orcid="0000-0003-1077-7537" pid="345/2198">Christian Eichenm&#252;ller</author>
<author orcid="0000-0002-8279-8401" pid="f/FCFreiling">Felix C. Freiling</author>
<title>Increasing Street Credibility: Cartography-Aware Forensic Analysis of GNSS Trace Validity.</title>
<pages>32:1-32:20</pages>
<year>2024</year>
<volume>5</volume>
<journal>DTRAP</journal>
<number>3</number>
<ee>https://doi.org/10.1145/3688809</ee>
<ee>https://www.wikidata.org/entity/Q130298565</ee>
<url>db/journals/dtrap/dtrap5.html#0003CJEF24</url>
</article>
</r>
<r><article key="journals/tissec/OttmannBF24" mdate="2025-01-19">
<author orcid="0000-0003-1090-0566" pid="229/0013">Jenny Ottmann</author>
<author orcid="0000-0001-5261-4600" pid="66/9068">Frank Breitinger</author>
<author orcid="0000-0002-8279-8401" pid="f/FCFreiling">Felix C. Freiling</author>
<title>An Experimental Assessment of Inconsistencies in Memory Forensics.</title>
<pages>2:1-2:29</pages>
<year>2024</year>
<volume>27</volume>
<journal>ACM Trans. Priv. Secur.</journal>
<number>1</number>
<ee>https://doi.org/10.1145/3628600</ee>
<ee>https://www.wikidata.org/entity/Q130950488</ee>
<url>db/journals/tissec/tissec27.html#OttmannBF24</url>
</article>
</r>
<r><inproceedings key="conf/checkmate/SchulzeLRF24" mdate="2025-03-03">
<author orcid="0009-0002-3615-7627" pid="384/6111">Matti Schulze</author>
<author orcid="0000-0003-2369-2196" pid="381/1579">Christian Lindenmeier</author>
<author orcid="0000-0002-3970-5580" pid="249/4099">Jonas R&#246;ckl</author>
<author orcid="0000-0002-8279-8401" pid="f/FCFreiling">Felix C. Freiling</author>
<title>IlluminaTEE: Effective Man-At-The-End Attacks from within ARM TrustZone.</title>
<pages>11-21</pages>
<year>2024</year>
<booktitle>Checkmate@CCS</booktitle>
<ee>https://doi.org/10.1145/3689934.3690838</ee>
<crossref>conf/checkmate/2024</crossref>
<url>db/conf/checkmate/checkmate2024.html#SchulzeLRF24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/nordsec/LindenmeierGRF24" mdate="2025-03-03">
<author orcid="0000-0003-2369-2196" pid="381/1579">Christian Lindenmeier</author>
<author pid="398/0962">Sven Gebhard</author>
<author orcid="0000-0002-3970-5580" pid="249/4099">Jonas R&#246;ckl</author>
<author orcid="0000-0002-8279-8401" pid="f/FCFreiling">Felix C. Freiling</author>
<title>CCKex: High Bandwidth Covert Channels over Encrypted Network Traffic.</title>
<pages>385-404</pages>
<year>2024</year>
<booktitle>NordSec</booktitle>
<ee>https://doi.org/10.1007/978-3-031-79007-2_20</ee>
<crossref>conf/nordsec/2024</crossref>
<url>db/conf/nordsec/nordsec2024.html#LindenmeierGRF24</url>
<stream>streams/conf/nordsec</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/sicherheit/EckhardtFH0P24" mdate="2024-10-14">
<author pid="378/5701">Dennis Eckhardt</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="37/5937">Dominik Herrmann</author>
<author pid="66/3585-1">Stefan Katzenbeisser 0001</author>
<author pid="69/154">Henrich C. P&#246;hls</author>
<title>Sicherheit in der Digitalisierung des Alltags: Definition eines ethnografisch-informatischen Forschungsfeldes f&#252;r die L&#246;sung allt&#228;glicher Sicherheitsprobleme.</title>
<pages>107-118</pages>
<year>2024</year>
<booktitle>Sicherheit</booktitle>
<ee type="oa">https://doi.org/10.18420/sicherheit2024_007</ee>
<crossref>conf/sicherheit/2024</crossref>
<url>db/conf/sicherheit/sicherheit2024.html#EckhardtFH0P24</url>
</inproceedings>
</r>
<r><proceedings key="conf/sicherheit/2024" mdate="2024-10-14">
<editor pid="53/3957">Steffen Wendzel</editor>
<editor pid="136/8406">Christian Wressnegger</editor>
<editor pid="252/8227">Laura Hartmann</editor>
<editor pid="f/FCFreiling">Felix C. Freiling</editor>
<editor pid="65/6856">Frederik Armknecht</editor>
<editor pid="128/9227">Lena Reinfelder</editor>
<title>Sicherheit, Schutz und Zuverl&#228;ssigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f&#252;r Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024.</title>
<booktitle>Sicherheit</booktitle>
<publisher>Gesellschaft f&#252;r Informatik e.V.</publisher>
<year>2024</year>
<series href="db/series/lni/index.html">LNI</series>
<volume>P-345</volume>
<isbn>978-3-88579-739-5</isbn>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/43948</ee>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/43966</ee>
<url>db/conf/sicherheit/sicherheit2024.html</url>
</proceedings>
</r>
<r><book key="series/gidiss/2023" mdate="2024-10-04">
<editor pid="r/RReischuk">R&#252;diger Reischuk</editor>
<editor pid="a/SvenApel">Sven Apel</editor>
<editor pid="b/AbrahamBernstein">Abraham Bernstein</editor>
<editor pid="41/2907">Maike Buchin</editor>
<editor pid="84/1516">Anna F&#246;rster</editor>
<editor pid="f/FCFreiling">Felix C. Freiling</editor>
<editor pid="m/JanMendling">Jan Mendling</editor>
<editor pid="44/4448">Gustaf Neumann</editor>
<editor pid="r/KayRomer">Kay Uwe R&#246;mer</editor>
<editor pid="15/503-1">Bj&#246;rn Scheuermann 0001</editor>
<editor pid="s/IngoScholtes">Ingo Scholtes</editor>
<editor pid="s/NicoleSchweikardt">Nicole Schweikardt</editor>
<editor pid="w/KlausWehrle">Klaus Wehrle</editor>
<title>Ausgezeichnete Informatikdissertationen 2023.</title>
<publisher>GI</publisher>
<year>2024</year>
<series href="db/series/lni/index.html">LNI</series>
<volume>D-24</volume>
<ee type="oa">https://dl.gi.de/collections/8a89b931-32cf-4a39-97a9-dc0630d5ace3</ee>
<ee>https://doi.org/10.18420/Diss2023-35</ee>
<url>db/series/gidiss/gidiss2023.html</url>
</book>
</r>
<r><article publtype="informal" key="journals/corr/abs-2404-12808" mdate="2024-05-22">
<author pid="253/1877">Julian Geus</author>
<author pid="229/0013">Jenny Ottmann</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Systematic Evaluation of Forensic Data Acquisition using Smartphone Local Backup.</title>
<year>2024</year>
<volume>abs/2404.12808</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2404.12808</ee>
<url>db/journals/corr/corr2404.html#abs-2404-12808</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2404-12864" mdate="2024-10-06">
<author pid="375/5947">Marcel Stachak</author>
<author pid="253/1877">Julian Geus</author>
<author orcid="0009-0001-1403-432X" pid="173/2644">Gaston Pugliese</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Nyon Unchained: Forensic Analysis of Bosch's eBike Board Computers.</title>
<year>2024</year>
<volume>abs/2404.12864</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2404.12864</ee>
<url>db/journals/corr/corr2404.html#abs-2404-12864</url>
</article>
</r>
<r><article key="journals/di/GruberHF23" mdate="2026-01-20">
<author orcid="0000-0003-1862-2900" pid="76/11015-1">Jan Gruber 0001</author>
<author orcid="0009-0008-1088-8302" pid="07/5792">Christopher James Hargreaves</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Contamination of digital evidence: Understanding an underexposed risk.</title>
<pages>301501</pages>
<year>2023</year>
<month>March</month>
<volume>44</volume>
<journal>Forensic Sci. Int. Digit. Investig.</journal>
<number>Supplement</number>
<ee type="oa">https://doi.org/10.1016/j.fsidi.2023.301501</ee>
<url>db/journals/di/di44.html#GruberHF23</url>
</article>
</r>
<r><article key="journals/dtrap/0003OGF23" mdate="2025-03-03">
<author pid="232/0279-3">Andreas Hammer 0003</author>
<author orcid="0009-0004-7190-280X" pid="390/1855">Mathis Ohlig</author>
<author pid="253/1877">Julian Geus</author>
<author orcid="0000-0002-8279-8401" pid="f/FCFreiling">Felix C. Freiling</author>
<title>A Functional Classification of Forensic Access to Storage and its Legal Implications.</title>
<pages>32:1-32:14</pages>
<year>2023</year>
<volume>4</volume>
<journal>DTRAP</journal>
<number>3</number>
<ee>https://doi.org/10.1145/3609231</ee>
<url>db/journals/dtrap/dtrap4.html#0003OGF23</url>
</article>
</r>
<r><article key="journals/dtrap/BajramovicFFRF23" mdate="2025-03-03">
<author pid="188/1036">Edita Bajramovic</author>
<author pid="170/2701">Christofer Fein</author>
<author pid="390/2044">Marius Frinken</author>
<author orcid="0000-0002-2324-5671" pid="185/1611">Paul R&#246;sler</author>
<author orcid="0000-0002-8279-8401" pid="f/FCFreiling">Felix C. Freiling</author>
<title>LAVA: Log Authentication and Verification Algorithm.</title>
<pages>35:1-35:17</pages>
<year>2023</year>
<volume>4</volume>
<journal>DTRAP</journal>
<number>3</number>
<ee>https://doi.org/10.1145/3609233</ee>
<ee>https://www.wikidata.org/entity/Q130912025</ee>
<url>db/journals/dtrap/dtrap4.html#BajramovicFFRF23</url>
</article>
</r>
<r><proceedings key="series/gidiss/2022" mdate="2023-11-17">
<editor pid="r/RReischuk">R&#252;diger Reischuk</editor>
<editor pid="a/SvenApel">Sven Apel</editor>
<editor pid="b/AbrahamBernstein">Abraham Bernstein</editor>
<editor pid="f/FCFreiling">Felix C. Freiling</editor>
<editor pid="l/HPLenhof">Hans-Peter Lenhof</editor>
<editor pid="44/4448">Gustaf Neumann</editor>
<editor pid="r/KayRomer">Kay Uwe R&#246;mer</editor>
<editor pid="15/503-1">Bj&#246;rn Scheuermann 0001</editor>
<editor pid="s/NicoleSchweikardt">Nicole Schweikardt</editor>
<editor pid="w/KlausWehrle">Klaus Wehrle</editor>
<title>Ausgezeichnete Informatikdissertationen 2022.</title>
<publisher>GI</publisher>
<year>2023</year>
<series href="db/series/lni/index.html">LNI</series>
<volume>D-23</volume>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/42584</ee>
<ee type="oa">https://dl.gi.de/items/5ebfcf6a-f95f-49c1-ba15-cadc988f7d7b</ee>
<url>db/series/gidiss/gidiss2022.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2307-12060" mdate="2024-05-07">
<author pid="229/0013">Jenny Ottmann</author>
<author pid="353/0235">&#220;same Cengiz</author>
<author orcid="0000-0001-5261-4600" pid="66/9068">Frank Breitinger</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>As if Time Had Stopped - Checking Memory Dumps for Quasi-Instantaneous Consistency.</title>
<year>2023</year>
<volume>abs/2307.12060</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2307.12060</ee>
<url>db/journals/corr/corr2307.html#abs-2307-12060</url>
</article>
</r>
<r><article key="journals/di/SchneiderDLDF22" mdate="2023-09-30">
<author orcid="0000-0002-7309-6440" pid="297/8832">Janine Schneider</author>
<author pid="319/8115">Linus D&#252;sel</author>
<author pid="171/8502">Benedikt Lorch</author>
<author pid="319/8427">Julia Drafz</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Prudent design principles for digital tampering experiments.</title>
<pages>301334</pages>
<year>2022</year>
<volume>40</volume>
<journal>Digit. Investig.</journal>
<number>Supplement</number>
<ee type="oa">https://doi.org/10.1016/j.fsidi.2022.301334</ee>
<url>db/journals/di/di40.html#SchneiderDLDF22</url>
</article>
</r>
<r><article key="journals/di/SchneiderEF22" mdate="2023-09-30">
<author orcid="0000-0002-7309-6440" pid="297/8832">Janine Schneider</author>
<author pid="326/2414">Maximilian Eichhorn</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Ambiguous file system partitions.</title>
<pages>301399</pages>
<year>2022</year>
<volume>42</volume>
<journal>Digit. Investig.</journal>
<number>Supplement</number>
<ee type="oa">https://doi.org/10.1016/j.fsidi.2022.301399</ee>
<url>db/journals/di/di42.html#SchneiderEF22</url>
</article>
</r>
<r><article key="journals/di/GruberVBF22" mdate="2026-01-20">
<author orcid="0000-0003-1862-2900" pid="76/11015-1">Jan Gruber 0001</author>
<author pid="330/8697">Lena L. Voigt</author>
<author pid="b/ZBenenson">Zinaida Benenson</author>
<author orcid="0000-0002-8279-8401" pid="f/FCFreiling">Felix C. Freiling</author>
<title>Foundations of cybercriminalistics: From general process models to case-specific concretizations in cybercrime investigations.</title>
<pages>301438</pages>
<year>2022</year>
<volume>43</volume>
<journal>Digit. Investig.</journal>
<number>Supplement</number>
<ee type="oa">https://doi.org/10.1016/j.fsidi.2022.301438</ee>
<url>db/journals/di/di43.html#GruberVBF22</url>
</article>
</r>
<r><article key="journals/dud/EinzingerRF22" mdate="2022-03-19">
<author pid="316/2797">Christoph Einzinger</author>
<author pid="32/957">Christian R&#252;ckert</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Datenminimierung in der Netzwerkforensik.</title>
<pages>149-155</pages>
<year>2022</year>
<volume>46</volume>
<journal>Datenschutz und Datensicherheit</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s11623-022-1580-0</ee>
<url>db/journals/dud/dud46.html#EinzingerRF22</url>
</article>
</r>
<r><article key="journals/dud/GruberF22" mdate="2026-01-20">
<author orcid="0000-0003-1862-2900" pid="76/11015-1">Jan Gruber 0001</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Fighting Evasive Malware.</title>
<pages>284-290</pages>
<year>2022</year>
<volume>46</volume>
<journal>Datenschutz und Datensicherheit</journal>
<number>5</number>
<ee>https://doi.org/10.1007/s11623-022-1604-9</ee>
<url>db/journals/dud/dud46.html#GruberF22</url>
</article>
</r>
<r><inproceedings key="conf/nordsec/LatzoHKHCFA22" mdate="2023-01-09">
<author pid="217/6939">Tobias Latzo</author>
<author pid="337/1159">Andreas Hellmich</author>
<author pid="337/1267">Annika Knepper</author>
<author pid="337/1113">Lukas Hardi</author>
<author pid="337/1130">Tim Phillip Castello-Waldow</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="75/10830">Andreas Attenberger</author>
<title>Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data.</title>
<pages>329-345</pages>
<year>2022</year>
<booktitle>NordSec</booktitle>
<ee>https://doi.org/10.1007/978-3-031-22295-5_18</ee>
<crossref>conf/nordsec/2022</crossref>
<url>db/conf/nordsec/nordsec2022.html#LatzoHKHCFA22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sicherheit/GruberF22" mdate="2026-01-20">
<author orcid="0000-0003-1862-2900" pid="76/11015-1">Jan Gruber 0001</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Fighting Evasive Malware: How to Pass the Reverse Turing Test By Utilizing a VMI-Based Human Interaction Simulator.</title>
<pages>49-64</pages>
<year>2022</year>
<booktitle>Sicherheit</booktitle>
<ee type="oa">https://doi.org/10.18420/sicherheit2022_03</ee>
<crossref>conf/sicherheit/2022</crossref>
<url>db/conf/sicherheit/sicherheit2022.html#GruberF22</url>
</inproceedings>
</r>
<r><proceedings key="series/gidiss/2021" mdate="2023-11-16">
<editor pid="48/415">Steffen H&#246;lldobler</editor>
<editor pid="r/RReischuk">R&#252;diger Reischuk</editor>
<editor pid="a/SvenApel">Sven Apel</editor>
<editor pid="b/AbrahamBernstein">Abraham Bernstein</editor>
<editor pid="f/FCFreiling">Felix C. Freiling</editor>
<editor pid="l/HPLenhof">Hans-Peter Lenhof</editor>
<editor pid="44/4448">Gustaf Neumann</editor>
<editor pid="r/KayRomer">Kay Uwe R&#246;mer</editor>
<editor pid="15/503-1">Bj&#246;rn Scheuermann 0001</editor>
<editor pid="s/NicoleSchweikardt">Nicole Schweikardt</editor>
<editor pid="w/KlausWehrle">Klaus Wehrle</editor>
<title>Ausgezeichnete Informatikdissertationen 2021.</title>
<publisher>GI</publisher>
<year>2022</year>
<series href="db/series/lni/index.html">LNI</series>
<volume>D-22</volume>
<isbn>978-3-88579-980-1</isbn>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/39830</ee>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/39856</ee>
<url>db/series/gidiss/gidiss2021.html</url>
</proceedings>
</r>
<r><article key="journals/compsec/MengesLVSPTKPFR21" mdate="2023-08-28">
<author pid="214/8801">Florian Menges</author>
<author pid="217/6939">Tobias Latzo</author>
<author orcid="0000-0002-1119-4715" pid="217/6903">Manfred Vielberth</author>
<author pid="288/1931">Sabine Sobola</author>
<author pid="69/154">Henrich C. P&#246;hls</author>
<author pid="34/11538">Benjamin Taubmann</author>
<author pid="37/10574">Johannes K&#246;stler</author>
<author pid="217/6981">Alexander Puchta</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="28/2554">Hans P. Reiser</author>
<author pid="p/GPernul">G&#252;nther Pernul</author>
<title>Towards GDPR-compliant data processing in modern SIEM systems.</title>
<pages>102165</pages>
<year>2021</year>
<volume>103</volume>
<journal>Comput. Secur.</journal>
<ee>https://doi.org/10.1016/j.cose.2020.102165</ee>
<ee>https://www.wikidata.org/entity/Q115049450</ee>
<url>db/journals/compsec/compsec103.html#MengesLVSPTKPFR21</url>
</article>
</r>
<r><article key="journals/di/FaustTMF21" mdate="2021-11-11">
<author pid="280/3092">Fabian Faust</author>
<author pid="126/1038">Aur&#233;lien Thierry</author>
<author pid="08/7968">Tilo M&#252;ller</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Selective Imaging of File System Data on Live Systems.</title>
<pages>301115</pages>
<year>2021</year>
<volume>36 Supplement</volume>
<journal>Digit. Investig.</journal>
<ee type="oa">https://doi.org/10.1016/j.fsidi.2021.301115</ee>
<url>db/journals/di/di36S.html#FaustTMF21</url>
</article>
</r>
<r><article key="journals/dud/OttmannPSSRF21" mdate="2023-09-30">
<author pid="229/0013">Jenny Ottmann</author>
<author pid="297/8685">Johannes Pollach</author>
<author pid="297/8741">Nicole Scheler</author>
<author orcid="0000-0002-7309-6440" pid="297/8832">Janine Schneider</author>
<author pid="32/957">Christian R&#252;ckert</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Zur Blackbox-Problematik im Bereich Mobilfunkforensik.</title>
<pages>546-552</pages>
<year>2021</year>
<volume>45</volume>
<journal>Datenschutz und Datensicherheit</journal>
<number>8</number>
<ee>https://doi.org/10.1007/s11623-021-1487-1</ee>
<url>db/journals/dud/dud45.html#OttmannPSSRF21</url>
</article>
</r>
<r><inproceedings key="conf/acsac/RocklPHMF21" mdate="2023-08-14">
<author pid="249/4099">Jonas R&#246;ckl</author>
<author pid="140/0788">Mykolai Protsenko</author>
<author orcid="0000-0003-3329-4036" pid="205/6042-1">Monika Huber 0001</author>
<author pid="08/7968">Tilo M&#252;ller</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Advanced System Resiliency Based on Virtualization Techniques for IoT Devices.</title>
<pages>455-467</pages>
<year>2021</year>
<booktitle>ACSAC</booktitle>
<ee>https://doi.org/10.1145/3485832.3485836</ee>
<crossref>conf/acsac/2021</crossref>
<url>db/conf/acsac/acsac2021.html#RocklPHMF21</url>
</inproceedings>
</r>
<r><book key="series/gidiss/2020" mdate="2023-11-16">
<editor pid="48/415">Steffen H&#246;lldobler</editor>
<editor pid="a/SvenApel">Sven Apel</editor>
<editor pid="b/AbrahamBernstein">Abraham Bernstein</editor>
<editor pid="f/FCFreiling">Felix C. Freiling</editor>
<editor pid="l/HPLenhof">Hans-Peter Lenhof</editor>
<editor pid="44/4448">Gustaf Neumann</editor>
<editor pid="r/RReischuk">R&#252;diger Reischuk</editor>
<editor pid="r/KayRomer">Kay Uwe R&#246;mer</editor>
<editor pid="15/503-1">Bj&#246;rn Scheuermann 0001</editor>
<editor pid="s/NicoleSchweikardt">Nicole Schweikardt</editor>
<editor pid="s/MyraSpiliopoulou">Myra Spiliopoulou</editor>
<editor pid="s/SSusstrunk">Sabine S&#252;sstrunk</editor>
<editor pid="w/KlausWehrle">Klaus Wehrle</editor>
<title>Ausgezeichnete Informatikdissertationen 2020.</title>
<booktitle>Ausgezeichnete Informatikdissertationen</booktitle>
<publisher>GI</publisher>
<year>2021</year>
<series href="db/series/lni/index.html">LNI</series>
<volume>D-21</volume>
<isbn>978-3-88579-775-3</isbn>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/37893</ee>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/37924</ee>
<url>db/series/gidiss/gidiss2020.html</url>
</book>
</r>
<r><article key="journals/di/MullanRF20" mdate="2023-08-28">
<author pid="171/7797">Patrick Mullan</author>
<author pid="21/8108">Christian Riess</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Towards Open-Set Forensic Source Grouping on JPEG Header Information.</title>
<pages>300916</pages>
<year>2020</year>
<volume>32 Supplement</volume>
<journal>Digit. Investig.</journal>
<ee>https://doi.org/10.1016/j.fsidi.2020.300916</ee>
<ee>https://www.wikidata.org/entity/Q115043641</ee>
<url>db/journals/di/di32S.html#MullanRF20</url>
</article>
</r>
<r><article key="journals/di/LatzoBF20" mdate="2022-07-27">
<author pid="217/6939">Tobias Latzo</author>
<author pid="277/8094">Julian Brost</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>BMCLeech: Introducing Stealthy Memory Forensics to BMC.</title>
<pages>300919</pages>
<year>2020</year>
<volume>32 Supplement</volume>
<journal>Digit. Investig.</journal>
<ee type="oa">https://doi.org/10.1016/j.fsidi.2020.300919</ee>
<url>db/journals/di/di32S.html#LatzoBF20</url>
</article>
</r>
<r><article key="journals/di/SchneiderWF20" mdate="2023-09-30">
<author orcid="0000-0002-7309-6440" pid="297/8832">Janine Schneider</author>
<author orcid="0000-0001-5430-4331" pid="66/7497-3">Julian Wolf 0003</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Tampering with Digital Evidence is Hard: The Case of Main Memory Images.</title>
<pages>300924</pages>
<year>2020</year>
<volume>32 Supplement</volume>
<journal>Digit. Investig.</journal>
<ee>https://doi.org/10.1016/j.fsidi.2020.300924</ee>
<url>db/journals/di/di32S.html#SchneiderWF20</url>
</article>
</r>
<r><article key="journals/di/SchneiderDMF20" mdate="2023-10-22">
<author orcid="0000-0002-7309-6440" pid="297/8832">Janine Schneider</author>
<author pid="207/8276">Hans-Peter Deifel</author>
<author pid="m/StefanMilius">Stefan Milius</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Unifying Metadata-Based Storage Reconstruction and Carving with LAYR.</title>
<pages>301006</pages>
<year>2020</year>
<volume>33 Supplement</volume>
<journal>Digit. Investig.</journal>
<ee>https://doi.org/10.1016/j.fsidi.2020.301006</ee>
<ee>https://www.wikidata.org/entity/Q122998918</ee>
<url>db/journals/di/di33S.html#SchneiderDMF20</url>
</article>
</r>
<r><inproceedings key="conf/icdf2c/BuschNFRSF20" mdate="2024-04-27">
<author pid="204/4058">Marcel Busch</author>
<author pid="373/4012">Florian Nicolai</author>
<author orcid="0000-0002-9018-7969" pid="271/4845">Fabian Fleischer</author>
<author pid="32/957">Christian R&#252;ckert</author>
<author pid="179/2529">Christoph Safferling</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Make Remote Forensic Investigations Forensic Again: Increasing the Evidential Value of Remote Forensic Investigations.</title>
<pages>23-43</pages>
<year>2020</year>
<booktitle>ICDF2C</booktitle>
<ee>https://doi.org/10.1007/978-3-030-68734-2_2</ee>
<crossref>conf/icdf2c/2020</crossref>
<url>db/conf/icdf2c/icdf2c2020.html#BuschNFRSF20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/raid/PalutkeRWF20" mdate="2021-06-17">
<author pid="191/8080">Ralph Palutke</author>
<author pid="295/0721">Simon Ruderich</author>
<author pid="295/1439">Matthias Wild</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>HyperLeech: Stealthy System Virtualization with Minimal Target Impact through DMA-Based Hypervisor Injection.</title>
<pages>165-179</pages>
<year>2020</year>
<booktitle>RAID</booktitle>
<ee type="oa">https://www.usenix.org/conference/raid2020/presentation/palutke</ee>
<crossref>conf/raid/2020</crossref>
<url>db/conf/raid/raid2020.html#PalutkeRWF20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sadfe/GrossDF20" mdate="2023-09-30">
<author pid="227/6441">Tobias Gro&#223;</author>
<author orcid="0000-0003-0820-8589" pid="270/4048">Richard Dirauf</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Systematic Analysis of Browser History Evidence.</title>
<pages>1-12</pages>
<year>2020</year>
<booktitle>SADFE</booktitle>
<ee>https://doi.org/10.1109/SADFE51007.2020.00010</ee>
<crossref>conf/sadfe/2020</crossref>
<url>db/conf/sadfe/sadfe2020.html#GrossDF20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sicherheit/MullerMF20" mdate="2021-01-13">
<author pid="257/8236">Nico M&#252;ller</author>
<author pid="08/7968">Tilo M&#252;ller</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Urheberrecht ./. Sicherheitsanalyse.</title>
<pages>105-115</pages>
<year>2020</year>
<booktitle>Sicherheit</booktitle>
<ee type="oa">https://doi.org/10.18420/sicherheit2020_08</ee>
<crossref>conf/sicherheit/2020</crossref>
<url>db/conf/sicherheit/sicherheit2020.html#MullerMF20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/MorgnerMKFB20" mdate="2023-09-21">
<author pid="180/3872">Philipp Morgner</author>
<author pid="88/4796">Christoph Mai</author>
<author pid="243/5885">Nicole Koschate-Fischer</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="b/ZBenenson">Zinaida Benenson</author>
<title>Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products.</title>
<pages>429-446</pages>
<year>2020</year>
<booktitle>SP</booktitle>
<ee>https://doi.org/10.1109/SP40000.2020.00021</ee>
<crossref>conf/sp/2020</crossref>
<url>db/conf/sp/sp2020.html#MorgnerMKFB20</url>
</inproceedings>
</r>
<r><book key="series/gidiss/2019" mdate="2023-11-16">
<editor pid="48/415">Steffen H&#246;lldobler</editor>
<editor pid="a/SvenApel">Sven Apel</editor>
<editor pid="b/AbrahamBernstein">Abraham Bernstein</editor>
<editor pid="f/FCFreiling">Felix C. Freiling</editor>
<editor pid="l/HPLenhof">Hans-Peter Lenhof</editor>
<editor pid="44/4448">Gustaf Neumann</editor>
<editor pid="r/RReischuk">R&#252;diger Reischuk</editor>
<editor pid="r/KayRomer">Kay Uwe R&#246;mer</editor>
<editor pid="15/503-1">Bj&#246;rn Scheuermann 0001</editor>
<editor pid="s/NicoleSchweikardt">Nicole Schweikardt</editor>
<editor pid="s/MyraSpiliopoulou">Myra Spiliopoulou</editor>
<editor pid="s/SSusstrunk">Sabine S&#252;sstrunk</editor>
<editor pid="w/KlausWehrle">Klaus Wehrle</editor>
<title>Ausgezeichnete Informatikdissertationen 2019.</title>
<publisher>GI</publisher>
<year>2020</year>
<series href="db/series/lni/index.html">LNI</series>
<volume>D-20</volume>
<isbn>978-3-88579-775-3</isbn>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/37999</ee>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/38018</ee>
<url>db/series/gidiss/gidiss2019.html</url>
</book>
</r>
<r><article publtype="informal" key="journals/corr/abs-2012-02573" mdate="2020-12-09">
<author pid="280/3092">Fabian Faust</author>
<author pid="126/1038">Aur&#233;lien Thierry</author>
<author pid="08/7968">Tilo M&#252;ller</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Technical Report: Selective Imaging of File System Data on Live Systems.</title>
<year>2020</year>
<volume>abs/2012.02573</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2012.02573</ee>
<url>db/journals/corr/corr2012.html#abs-2012-02573</url>
</article>
</r>
<r><article key="journals/di/LatzoPF19" mdate="2025-01-19">
<author pid="217/6939">Tobias Latzo</author>
<author pid="191/8080">Ralph Palutke</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>A universal taxonomy and survey of forensic memory acquisition techniques.</title>
<pages>56-69</pages>
<year>2019</year>
<volume>28</volume>
<journal>Digit. Investig.</journal>
<number>Supplement</number>
<ee>https://doi.org/10.1016/j.diin.2019.01.001</ee>
<ee>https://www.wikidata.org/entity/Q128624899</ee>
<url>db/journals/di/di28.html#LatzoPF19</url>
</article>
</r>
<r><article key="journals/di/MullanRF19" mdate="2025-01-19">
<author pid="171/7797">Patrick Mullan</author>
<author pid="21/8108">Christian Riess</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Forensic source identification using JPEG image headers: The case of smartphones.</title>
<pages>S68-S76</pages>
<year>2019</year>
<volume>28 Supplement</volume>
<journal>Digit. Investig.</journal>
<ee type="oa">https://doi.org/10.1016/j.diin.2019.01.016</ee>
<ee>https://www.wikidata.org/entity/Q127967551</ee>
<url>db/journals/di/di28S.html#MullanRF19</url>
</article>
</r>
<r><article key="journals/insk/SchillerFBM19" mdate="2022-10-02">
<author orcid="0000-0002-7632-7179" pid="238/4798">Jan Schiller</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="b/ZBenenson">Zinaida Benenson</author>
<author pid="87/6832">Werner Massonne</author>
<title>Berufsbegleitendes Studieren an Universit&#228;ten - Ein Zukunftsfeld f&#252;r die IT-Sicherheit.</title>
<pages>38-47</pages>
<year>2019</year>
<volume>42</volume>
<journal>Inform. Spektrum</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s00287-019-01145-6</ee>
<url>db/journals/insk/insk42.html#SchillerFBM19</url>
</article>
</r>
<r><article key="journals/tdsc/MaeneGMCFV19" mdate="2025-01-19">
<author orcid="0000-0002-4807-5939" pid="165/8395">Pieter Maene</author>
<author pid="147/1799">Johannes G&#246;tzfried</author>
<author pid="08/7968">Tilo M&#252;ller</author>
<author pid="135/8075">Ruan de Clercq</author>
<author orcid="0000-0002-8279-8401" pid="f/FCFreiling">Felix C. Freiling</author>
<author orcid="0000-0002-0879-076X" pid="92/16">Ingrid Verbauwhede</author>
<title>Atlas: Application Confidentiality in Compromised Embedded Systems.</title>
<pages>415-423</pages>
<year>2019</year>
<volume>16</volume>
<journal>IEEE Trans. Dependable Secur. Comput.</journal>
<number>3</number>
<ee>https://doi.org/10.1109/TDSC.2018.2858257</ee>
<ee>https://www.wikidata.org/entity/Q129508033</ee>
<url>db/journals/tdsc/tdsc16.html#MaeneGMCFV19</url>
</article>
</r>
<r><inproceedings key="conf/cecc/SchorradtBF19" mdate="2025-01-19">
<author pid="251/5922">Stefan Schorradt</author>
<author pid="188/1036">Edita Bajramovic</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>On the Feasibility of Secure Logging for Industrial Control Systems Using Blockchain.</title>
<pages>4:1-4:6</pages>
<year>2019</year>
<booktitle>CECC</booktitle>
<ee>https://doi.org/10.1145/3360664.3360668</ee>
<ee>https://www.wikidata.org/entity/Q130868090</ee>
<crossref>conf/cecc/2019</crossref>
<url>db/conf/cecc/cecc2019.html#SchorradtBF19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cecc/AbdullahHF19" mdate="2019-10-28">
<author pid="211/3348">Lamya Abdullah</author>
<author pid="179/2825">Sebastian Hahn</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Achieving Consistency of Software Updates against Strong Attackers.</title>
<pages>6:1-6:6</pages>
<year>2019</year>
<booktitle>CECC</booktitle>
<ee>https://doi.org/10.1145/3360664.3360670</ee>
<crossref>conf/cecc/2019</crossref>
<url>db/conf/cecc/cecc2019.html#AbdullahHF19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/trustcom/LatzoF19" mdate="2019-11-14">
<author pid="217/6939">Tobias Latzo</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Characterizing the Limitations of Forensic Event Reconstruction Based on Log Files.</title>
<pages>466-475</pages>
<year>2019</year>
<booktitle>TrustCom/BigDataSE</booktitle>
<ee>https://doi.org/10.1109/TrustCom/BigDataSE.2019.00069</ee>
<crossref>conf/trustcom/2019</crossref>
<url>db/conf/trustcom/trustcom2019.html#LatzoF19</url>
</inproceedings>
</r>
<r><book key="series/gidiss/2018" mdate="2023-07-04">
<editor pid="a/SvenApel">Sven Apel</editor>
<editor pid="b/AbrahamBernstein">Abraham Bernstein</editor>
<editor pid="f/FCFreiling">Felix C. Freiling</editor>
<editor pid="48/415">Steffen H&#246;lldobler</editor>
<editor pid="l/HPLenhof">Hans-Peter Lenhof</editor>
<editor pid="m/PMolitor">Paul Molitor</editor>
<editor pid="44/4448">Gustaf Neumann</editor>
<editor pid="r/RReischuk">R&#252;diger Reischuk</editor>
<editor pid="15/503-1">Bj&#246;rn Scheuermann 0001</editor>
<editor pid="s/NicoleSchweikardt">Nicole Schweikardt</editor>
<editor pid="s/MyraSpiliopoulou">Myra Spiliopoulou</editor>
<editor pid="s/SSusstrunk">Sabine S&#252;sstrunk</editor>
<editor pid="w/KlausWehrle">Klaus Wehrle</editor>
<title>Ausgezeichnete Informatikdissertationen 2018.</title>
<booktitle>Ausgezeichnete Informatikdissertationen</booktitle>
<publisher>GI</publisher>
<year>2019</year>
<series>LNI</series>
<volume>D-19</volume>
<isbn>978-3-88579-977-1</isbn>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/36723</ee>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/36745</ee>
<url>db/series/gidiss/gidiss2018.html</url>
</book>
</r>
<r><article publtype="informal" key="journals/corr/abs-1906-07841" mdate="2019-06-24">
<author pid="211/3348">Lamya Abdullah</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="211/3416">Juan Quintero</author>
<author pid="b/ZBenenson">Zinaida Benenson</author>
<title>Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing.</title>
<year>2019</year>
<volume>abs/1906.07841</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1906.07841</ee>
<url>db/journals/corr/corr1906.html#abs-1906-07841</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1906-11094" mdate="2019-06-27">
<author pid="180/3872">Philipp Morgner</author>
<author pid="88/4796">Christoph Mai</author>
<author pid="243/5885">Nicole Koschate-Fischer</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="b/ZBenenson">Zinaida Benenson</author>
<title>Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products.</title>
<year>2019</year>
<volume>abs/1906.11094</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1906.11094</ee>
<url>db/journals/corr/corr1906.html#abs-1906-11094</url>
</article>
</r>
<r><article key="journals/di/NemetzSF18" mdate="2025-01-19">
<author pid="217/0258">Sebastian Nemetz</author>
<author pid="84/10985">Sven Schmitt</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>A standardized corpus for SQLite database forensics.</title>
<pages>S121-S130</pages>
<year>2018</year>
<volume>24 Supplement</volume>
<journal>Digit. Investig.</journal>
<ee type="oa">https://doi.org/10.1016/j.diin.2018.01.015</ee>
<ee>https://www.wikidata.org/entity/Q130093736</ee>
<url>db/journals/di/di24.html#NemetzSF18</url>
</article>
</r>
<r><article key="journals/di/PalutkeF18" mdate="2025-01-19">
<author pid="191/8080">Ralph Palutke</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Styx: Countering robust memory acquisition.</title>
<pages>S18-S28</pages>
<year>2018</year>
<volume>24 Supplement</volume>
<journal>Digit. Investig.</journal>
<ee type="oa">https://doi.org/10.1016/j.diin.2018.01.004</ee>
<ee>https://www.wikidata.org/entity/Q130092252</ee>
<url>db/journals/di/di24.html#PalutkeF18</url>
</article>
</r>
<r><article key="journals/di/FreilingH18" mdate="2025-01-19">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="217/0280">Leonhard H&#246;sch</author>
<title>Controlled experiments in digital evidence tampering.</title>
<pages>S83-S92</pages>
<year>2018</year>
<volume>24 Supplement</volume>
<journal>Digit. Investig.</journal>
<ee type="oa">https://doi.org/10.1016/j.diin.2018.01.011</ee>
<ee>https://www.wikidata.org/entity/Q130090878</ee>
<url>db/journals/di/di24.html#FreilingH18</url>
</article>
</r>
<r><article key="journals/dt/FreilingGLMP18" mdate="2020-03-13">
<author orcid="0000-0002-8279-8401" pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="227/6441">Tobias Gro&#223;</author>
<author pid="217/6939">Tobias Latzo</author>
<author pid="08/7968">Tilo M&#252;ller</author>
<author pid="191/8080">Ralph Palutke</author>
<title>Advances in Forensic Data Acquisition.</title>
<pages>63-74</pages>
<year>2018</year>
<volume>35</volume>
<journal>IEEE Des. Test</journal>
<number>5</number>
<ee>https://doi.org/10.1109/MDAT.2018.2862366</ee>
<url>db/journals/dt/dt35.html#FreilingGLMP18</url>
</article>
</r>
<r><article key="journals/tc/MaeneGCMFV18" mdate="2019-09-25">
<author orcid="0000-0002-4807-5939" pid="165/8395">Pieter Maene</author>
<author pid="147/1799">Johannes G&#246;tzfried</author>
<author pid="135/8075">Ruan de Clercq</author>
<author pid="08/7968">Tilo M&#252;ller</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author orcid="0000-0002-0879-076X" pid="92/16">Ingrid Verbauwhede</author>
<title>Hardware-Based Trusted Computing Architectures for Isolation and Attestation.</title>
<pages>361-374</pages>
<year>2018</year>
<volume>67</volume>
<journal>IEEE Trans. Computers</journal>
<number>3</number>
<ee>https://doi.org/10.1109/TC.2017.2647955</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TC.2017.2647955</ee>
<url>db/journals/tc/tc67.html#MaeneGCMFV18</url>
</article>
</r>
<r><inproceedings key="conf/esorics/AbdullahFQB18" mdate="2019-01-31">
<author pid="211/3348">Lamya Abdullah</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="211/3416">Juan Quintero</author>
<author pid="b/ZBenenson">Zinaida Benenson</author>
<title>Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing.</title>
<pages>137-152</pages>
<year>2018</year>
<booktitle>CyberICPS/SECPRE@ESORICS</booktitle>
<ee>https://doi.org/10.1007/978-3-030-12786-2_9</ee>
<crossref>conf/esorics/2018cicps</crossref>
<url>db/conf/esorics/cicps2018.html#AbdullahFQB18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/imf/FreilingB18" mdate="2025-02-04">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="188/1036">Edita Bajramovic</author>
<title>Principles of Secure Logging for Safekeeping Digital Evidence.</title>
<pages>65-75</pages>
<year>2018</year>
<booktitle>IMF</booktitle>
<ee>https://doi.org/10.1109/IMF.2018.00012</ee>
<crossref>conf/imf/2018</crossref>
<url>db/conf/imf/imf2018.html#FreilingB18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/imf/ZiegerFK18" mdate="2025-02-04">
<author pid="396/4491">Andrej Zieger</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="27/3822">Klaus-Peter Kossakowski</author>
<title>The &#946;-Time-to-Compromise Metric for Practical Cyber Security Risk Estimation.</title>
<pages>115-133</pages>
<year>2018</year>
<booktitle>IMF</booktitle>
<ee>https://doi.org/10.1109/IMF.2018.00017</ee>
<crossref>conf/imf/2018</crossref>
<url>db/conf/imf/imf2018.html#ZiegerFK18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/soups/HanschSPFB18" mdate="2021-02-01">
<author pid="155/4403">Norman H&#228;nsch</author>
<author pid="78/6239">Andrea Schankin</author>
<author pid="140/0788">Mykolai Protsenko</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="b/ZBenenson">Zinaida Benenson</author>
<title>Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently.</title>
<pages>341-356</pages>
<year>2018</year>
<booktitle>SOUPS @ USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/soups2018/presentation/hansch</ee>
<crossref>conf/soups/2018</crossref>
<url>db/conf/soups/soups2018.html#HanschSPFB18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wisec/MorgnerFB18" mdate="2018-11-21">
<author pid="180/3872">Philipp Morgner</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="b/ZBenenson">Zinaida Benenson</author>
<title>Opinion: Security Lifetime Labels - Overcoming Information Asymmetry in Security of IoT Consumer Products.</title>
<pages>208-211</pages>
<year>2018</year>
<booktitle>WISEC</booktitle>
<ee>https://doi.org/10.1145/3212480.3212486</ee>
<crossref>conf/wisec/2018</crossref>
<url>db/conf/wisec/wisec2018.html#MorgnerFB18</url>
</inproceedings>
</r>
<r><book key="conf/gi/2017diss" mdate="2023-07-04">
<editor pid="a/SvenApel">Sven Apel</editor>
<editor pid="b/AbrahamBernstein">Abraham Bernstein</editor>
<editor pid="e/WEffelsberg">Wolfgang Effelsberg</editor>
<editor pid="f/FCFreiling">Felix C. Freiling</editor>
<editor pid="48/415">Steffen H&#246;lldobler</editor>
<editor pid="l/HPLenhof">Hans-Peter Lenhof</editor>
<editor pid="m/PMolitor">Paul Molitor</editor>
<editor pid="44/4448">Gustaf Neumann</editor>
<editor pid="r/RReischuk">R&#252;diger Reischuk</editor>
<editor pid="s/NicoleSchweikardt">Nicole Schweikardt</editor>
<editor pid="15/503-1">Bj&#246;rn Scheuermann 0001</editor>
<editor pid="s/MyraSpiliopoulou">Myra Spiliopoulou</editor>
<editor pid="s/SSusstrunk">Sabine S&#252;sstrunk</editor>
<title>Ausgezeichnete Informatikdissertationen 2017</title>
<booktitle>Ausgezeichnete Informatikdissertationen</booktitle>
<publisher>GI</publisher>
<volume>D-18</volume>
<year>2018</year>
<isbn>978-3-88579-977-1</isbn>
<series href="db/series/lni/index.html">LNI</series>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/19456</ee>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/19479</ee>
<url>db/conf/gi/diss2017.html</url>
</book>
</r>
<r><article key="journals/di/FreilingGR17" mdate="2022-07-27">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="306/0808">Thomas Glanzmann</author>
<author orcid="0000-0002-2815-5747" pid="28/2554">Hans P. Reiser</author>
<title>Characterizing loss of digital evidence due to abstraction layers.</title>
<pages>S107-S115</pages>
<year>2017</year>
<volume>20 Supplement</volume>
<journal>Digit. Investig.</journal>
<ee type="oa">https://doi.org/10.1016/j.diin.2017.01.012</ee>
<url>db/journals/di/di20S.html#FreilingGR17</url>
</article>
</r>
<r><article key="journals/di/FreilingZ17" mdate="2021-12-30">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="165/0486">Christian Zoubek</author>
<title>Do digital investigators have to program? A controlled experiment in digital investigation.</title>
<pages>S37-S46</pages>
<year>2017</year>
<volume>20 Supplement</volume>
<journal>Digit. Investig.</journal>
<ee>https://doi.org/10.1016/j.diin.2017.01.004</ee>
<url>db/journals/di/di20S.html#FreilingZ17</url>
</article>
</r>
<r><article key="journals/tissec/NoormanBMPMPVGM17" mdate="2024-02-05">
<author pid="119/6689">Job Noorman</author>
<author orcid="0000-0002-5953-9196" pid="167/1573">Jo Van Bulck</author>
<author orcid="0000-0001-5035-0576" pid="84/4044">Jan Tobias M&#252;hlberg</author>
<author pid="85/6647">Frank Piessens</author>
<author orcid="0000-0002-4807-5939" pid="165/8395">Pieter Maene</author>
<author orcid="0000-0003-2005-9651" pid="p/BartPreneel">Bart Preneel</author>
<author orcid="0000-0002-0879-076X" pid="92/16">Ingrid Verbauwhede</author>
<author pid="147/1799">Johannes G&#246;tzfried</author>
<author pid="08/7968">Tilo M&#252;ller</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Sancus 2.0: A Low-Cost Security Architecture for IoT Devices.</title>
<pages>7:1-7:33</pages>
<year>2017</year>
<volume>20</volume>
<journal>ACM Trans. Priv. Secur.</journal>
<number>3</number>
<ee>https://doi.org/10.1145/3079763</ee>
<url>db/journals/tissec/tissec20.html#NoormanBMPMPVGM17</url>
</article>
</r>
<r><book key="conf/gi/2016diss" mdate="2023-07-04">
<editor pid="b/AbrahamBernstein">Abraham Bernstein</editor>
<editor pid="e/WEffelsberg">Wolfgang Effelsberg</editor>
<editor pid="f/FCFreiling">Felix C. Freiling</editor>
<editor pid="48/415">Steffen H&#246;lldobler</editor>
<editor pid="l/HPLenhof">Hans-Peter Lenhof</editor>
<editor pid="m/PMolitor">Paul Molitor</editor>
<editor pid="44/4448">Gustaf Neumann</editor>
<editor pid="r/RReischuk">R&#252;diger Reischuk</editor>
<editor pid="s/NicoleSchweikardt">Nicole Schweikardt</editor>
<editor pid="s/MyraSpiliopoulou">Myra Spiliopoulou</editor>
<editor pid="s/SSusstrunk">Sabine S&#252;sstrunk</editor>
<title>Ausgezeichnete Informatikdissertationen 2016</title>
<booktitle>Ausgezeichnete Informatikdissertationen</booktitle>
<publisher>GI</publisher>
<volume>D-17</volume>
<year>2017</year>
<isbn>978-3-88579-976-4</isbn>
<series href="db/series/lni/index.html">LNI</series>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/19926</ee>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/19953</ee>
<url>db/conf/gi/diss2016.html</url>
</book>
</r>
<r><article key="journals/di/GruhnF16" mdate="2021-11-17">
<author pid="147/1759">Michael Gruhn</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Evaluating atomicity, and integrity of correct memory acquisition methods.</title>
<pages>S1-S10</pages>
<year>2016</year>
<volume>16 Supplement</volume>
<journal>Digit. Investig.</journal>
<ee>https://doi.org/10.1016/j.diin.2016.01.003</ee>
<url>db/journals/di/di16S.html#GruhnF16</url>
</article>
</r>
<r><article key="journals/di/0004GF16" mdate="2022-03-16">
<author pid="23/2293-4">Johannes Bauer 0004</author>
<author pid="147/1759">Michael Gruhn</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Lest we forget: Cold-boot attacks on scrambled DDR3 memory.</title>
<pages>S65-S74</pages>
<year>2016</year>
<volume>16 Supplement</volume>
<journal>Digit. Investig.</journal>
<ee>https://doi.org/10.1016/j.diin.2016.01.009</ee>
<ee>https://www.wikidata.org/entity/Q59540996</ee>
<url>db/journals/di/di16S.html#0004GF16</url>
</article>
</r>
<r><article key="journals/ieeesp/StritterFKRUGED16" mdate="2025-03-03">
<author pid="178/8065">Benjamin Stritter</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="k/HartmutKonig">Hartmut K&#246;nig</author>
<author pid="27/6161">Ren&#233; Rietz</author>
<author pid="178/8190">Steffen Ullrich</author>
<author orcid="0009-0005-0932-7311" pid="07/10980">Alexander von Gernler</author>
<author pid="145/5199">Felix Erlacher</author>
<author orcid="0000-0002-1989-1750" pid="d/FalkoDressler">Falko Dressler</author>
<title>Cleaning up Web 2.0's Security Mess-at Least Partly.</title>
<pages>48-57</pages>
<year>2016</year>
<volume>14</volume>
<journal>IEEE Secur. Priv.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/MSP.2016.31</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/MSP.2016.31</ee>
<url>db/journals/ieeesp/ieeesp14.html#StritterFKRUGED16</url>
</article>
</r>
<r><article key="journals/insk/Freiling16" mdate="2020-08-13">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Staatliche Sp&#228;hsoftware zur Strafverfolgung - Zur Verh&#228;ltnism&#228;&#223;igkeit einer umstrittenen Ma&#223;nahme.</title>
<pages>203-209</pages>
<year>2016</year>
<volume>39</volume>
<journal>Inform. Spektrum</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s00287-015-0912-y</ee>
<url>db/journals/insk/insk39.html#Freiling16</url>
</article>
</r>
<r><article key="journals/it/DrescherEFGLMMV16" mdate="2024-02-05">
<author pid="144/2453">Gabor Drescher</author>
<author pid="43/11521">Christoph Erhardt</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="147/1799">Johannes G&#246;tzfried</author>
<author orcid="0000-0001-8224-4161" pid="57/863">Daniel Lohmann</author>
<author orcid="0000-0002-4807-5939" pid="165/8395">Pieter Maene</author>
<author pid="08/7968">Tilo M&#252;ller</author>
<author orcid="0000-0002-0879-076X" pid="92/16">Ingrid Verbauwhede</author>
<author orcid="0000-0002-1368-8559" pid="34/9945">Andreas Weichslgartner</author>
<author pid="24/5422">Stefan Wildermann</author>
<title>Providing security on demand using invasive computing.</title>
<pages>281-295</pages>
<year>2016</year>
<volume>58</volume>
<journal>it Inf. Technol.</journal>
<number>6</number>
<ee>https://doi.org/10.1515/itit-2016-0032</ee>
<ee>https://www.wikidata.org/entity/Q115723108</ee>
<url>db/journals/it/it58.html#DrescherEFGLMMV16</url>
</article>
</r>
<r><article key="journals/popets/KurtzGBRF16" mdate="2020-09-01">
<author pid="133/2821-1">Andreas Kurtz 0001</author>
<author pid="93/10527">Hugo Gascon</author>
<author pid="27/258">Tobias Becker</author>
<author pid="64/4020">Konrad Rieck</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Fingerprinting Mobile Devices Using Personalized Configurations.</title>
<pages>4-19</pages>
<year>2016</year>
<volume>2016</volume>
<journal>Proc. Priv. Enhancing Technol.</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.1515/popets-2015-0027</ee>
<url>db/journals/popets/popets2016.html#KurtzGBRF16</url>
</article>
</r>
<r><inproceedings key="conf/IEEEares/BauerF16" mdate="2023-03-24">
<author pid="23/2293-4">Johannes Bauer 0004</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Towards Cycle-Accurate Emulation of Cortex-M Code to Detect Timing Side Channels.</title>
<pages>49-58</pages>
<year>2016</year>
<booktitle>ARES</booktitle>
<ee>https://doi.org/10.1109/ARES.2016.94</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ARES.2016.94</ee>
<crossref>conf/IEEEares/2016</crossref>
<url>db/conf/IEEEares/ares2016.html#BauerF16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/host/BauerSFD16" mdate="2023-03-24">
<author pid="23/2293-4">Johannes Bauer 0004</author>
<author pid="43/11495">Sebastian Schinzel</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="30/7968">Andreas Dewald</author>
<title>Information leakage behind the curtain: Abusing anti-EMI features for covert communication.</title>
<pages>130-134</pages>
<year>2016</year>
<booktitle>HOST</booktitle>
<ee>https://doi.org/10.1109/HST.2016.7495570</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/HST.2016.7495570</ee>
<crossref>conf/host/2016</crossref>
<url>db/conf/host/host2016.html#BauerSFD16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/scopes/WeichslgartnerW16" mdate="2018-11-06">
<author orcid="0000-0002-1368-8559" pid="34/9945">Andreas Weichslgartner</author>
<author pid="24/5422">Stefan Wildermann</author>
<author pid="147/1799">Johannes G&#246;tzfried</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="57/6207">Michael Gla&#223;</author>
<author pid="t/JurgenTeich">J&#252;rgen Teich</author>
<title>Design-Time/Run-Time Mapping of Security-Critical Applications in Heterogeneous MPSoCs.</title>
<pages>153-162</pages>
<year>2016</year>
<booktitle>SCOPES</booktitle>
<ee>https://doi.org/10.1145/2906363.2906370</ee>
<crossref>conf/scopes/2016</crossref>
<url>db/conf/scopes/scopes2016.html#WeichslgartnerW16</url>
</inproceedings>
</r>
<r><book key="conf/gi/2015diss" mdate="2023-07-04">
<editor pid="b/AbrahamBernstein">Abraham Bernstein</editor>
<editor pid="e/WEffelsberg">Wolfgang Effelsberg</editor>
<editor pid="f/FCFreiling">Felix C. Freiling</editor>
<editor pid="48/415">Steffen H&#246;lldobler</editor>
<editor pid="l/HPLenhof">Hans-Peter Lenhof</editor>
<editor pid="m/PMolitor">Paul Molitor</editor>
<editor pid="44/4448">Gustaf Neumann</editor>
<editor pid="r/RReischuk">R&#252;diger Reischuk</editor>
<editor pid="s/NicoleSchweikardt">Nicole Schweikardt</editor>
<editor pid="s/MyraSpiliopoulou">Myra Spiliopoulou</editor>
<editor pid="39/5044">Harald St&#246;rrle</editor>
<editor pid="s/SSusstrunk">Sabine S&#252;sstrunk</editor>
<title>Ausgezeichnete Informatikdissertationen 2015</title>
<booktitle>Ausgezeichnete Informatikdissertationen</booktitle>
<publisher>GI</publisher>
<volume>D-16</volume>
<year>2016</year>
<isbn>978-3-88579-975-7</isbn>
<series href="db/series/lni/index.html">LNI</series>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/4410</ee>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/4567</ee>
<url>db/conf/gi/diss2015.html</url>
</book>
</r>
<r><article key="journals/istr/AnikeevFGM15" mdate="2023-08-28">
<author orcid="0000-0002-4959-2663" pid="74/5976">Maxim Anikeev</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="147/1799">Johannes G&#246;tzfried</author>
<author pid="08/7968">Tilo M&#252;ller</author>
<title>Secure garbage collection: Preventing malicious data harvesting from deallocated Java objects inside the Dalvik VM.</title>
<pages>81-86</pages>
<year>2015</year>
<volume>22</volume>
<journal>J. Inf. Secur. Appl.</journal>
<ee>https://doi.org/10.1016/j.jisa.2014.10.001</ee>
<ee>https://www.wikidata.org/entity/Q115041542</ee>
<url>db/journals/istr/istr22.html#AnikeevFGM15</url>
</article>
</r>
<r><article key="journals/it/Freiling15" mdate="2020-03-06">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>From IT forensics to forensic computing.</title>
<pages>337-338</pages>
<year>2015</year>
<volume>57</volume>
<journal>it Inf. Technol.</journal>
<number>6</number>
<ee>http://www.degruyter.com/view/j/itit.2015.57.issue-6/itit-2015-0039/itit-2015-0039.xml</ee>
<url>db/journals/it/it57.html#Freiling15</url>
</article>
</r>
<r><article key="journals/it/FreilingSG15" mdate="2020-03-06">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="173/2721">Jan C. Schuhr</author>
<author pid="147/1759">Michael Gruhn</author>
<title>What is essential data in digital forensic analysis?</title>
<pages>376-383</pages>
<year>2015</year>
<volume>57</volume>
<journal>it Inf. Technol.</journal>
<number>6</number>
<ee>http://www.degruyter.com/view/j/itit.2015.57.issue-6/itit-2015-0016/itit-2015-0016.xml</ee>
<url>db/journals/it/it57.html#FreilingSG15</url>
</article>
</r>
<r><article key="journals/tdsc/MullerF15" mdate="2023-08-28">
<author pid="08/7968">Tilo M&#252;ller</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>A Systematic Assessment of the Security of Full Disk Encryption.</title>
<pages>491-503</pages>
<year>2015</year>
<volume>12</volume>
<journal>IEEE Trans. Dependable Secur. Comput.</journal>
<number>5</number>
<ee>https://doi.org/10.1109/TDSC.2014.2369041</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TDSC.2014.2369041</ee>
<ee>https://www.wikidata.org/entity/Q121334099</ee>
<url>db/journals/tdsc/tdsc12.html#MullerF15</url>
</article>
</r>
<r><inproceedings key="conf/acsac/GotzfriedMCMFV15" mdate="2025-01-19">
<author pid="147/1799">Johannes G&#246;tzfried</author>
<author pid="08/7968">Tilo M&#252;ller</author>
<author orcid="0000-0003-2910-6469" pid="135/8075">Ruan de Clercq</author>
<author orcid="0000-0002-4807-5939" pid="165/8395">Pieter Maene</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author orcid="0000-0002-0879-076X" pid="92/16">Ingrid Verbauwhede</author>
<title>Soteria: Offline Software Protection within Low-cost Embedded Devices.</title>
<pages>241-250</pages>
<year>2015</year>
<booktitle>ACSAC</booktitle>
<ee>https://doi.org/10.1145/2818000.2856129</ee>
<ee>https://www.wikidata.org/entity/Q130970297</ee>
<crossref>conf/acsac/2015</crossref>
<url>db/conf/acsac/acsac2015.html#GotzfriedMCMFV15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/imf/FreilingG15" mdate="2023-03-24">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="147/1759">Michael Gruhn</author>
<title>What is Essential Data in Digital Forensic Analysis?</title>
<pages>40-48</pages>
<year>2015</year>
<booktitle>IMF</booktitle>
<ee>https://doi.org/10.1109/IMF.2015.20</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/IMF.2015.20</ee>
<crossref>conf/imf/2015</crossref>
<url>db/conf/imf/imf2015.html#FreilingG15</url>
</inproceedings>
</r>
<r><book key="conf/gi/2014diss" mdate="2023-07-04">
<editor pid="b/AbrahamBernstein">Abraham Bernstein</editor>
<editor pid="e/WEffelsberg">Wolfgang Effelsberg</editor>
<editor pid="f/FCFreiling">Felix C. Freiling</editor>
<editor pid="48/415">Steffen H&#246;lldobler</editor>
<editor pid="l/HPLenhof">Hans-Peter Lenhof</editor>
<editor pid="m/PMolitor">Paul Molitor</editor>
<editor pid="44/4448">Gustaf Neumann</editor>
<editor pid="r/RReischuk">R&#252;diger Reischuk</editor>
<editor pid="s/NicoleSchweikardt">Nicole Schweikardt</editor>
<editor pid="s/MyraSpiliopoulou">Myra Spiliopoulou</editor>
<editor pid="39/5044">Harald St&#246;rrle</editor>
<editor pid="s/SSusstrunk">Sabine S&#252;sstrunk</editor>
<title>Ausgezeichnete Informatikdissertationen 2014</title>
<booktitle>Ausgezeichnete Informatikdissertationen</booktitle>
<publisher>GI</publisher>
<volume>D-15</volume>
<year>2015</year>
<isbn>978-3-88579-419-6</isbn>
<series href="db/series/lni/index.html">LNI</series>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/4412</ee>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/33835</ee>
<url>db/conf/gi/diss2014.html</url>
</book>
</r>
<r><article key="journals/dud/FreilingS14" mdate="2017-05-27">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="144/1355">Konstantin Sack</author>
<title>Selektive Datensicherungen in der IT-Forensik.</title>
<pages>112-117</pages>
<year>2014</year>
<volume>38</volume>
<journal>Datenschutz und Datensicherheit</journal>
<number>2</number>
<ee>https://doi.org/10.1007/s11623-014-0043-7</ee>
<url>db/journals/dud/dud38.html#FreilingS14</url>
</article>
</r>
<r><article key="journals/insk/FreilingGGKMMRS14" mdate="2020-08-13">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="g/RGrimm">R&#252;diger Grimm</author>
<author pid="81/6983">Karl-Erwin Gro&#223;pietsch</author>
<author orcid="0000-0001-9916-5283" pid="16/1206">Hubert B. Keller</author>
<author pid="16/6896">J&#252;rgen Mottok</author>
<author pid="26/5492">Isabel M&#252;nch</author>
<author pid="r/KRannenberg">Kai Rannenberg</author>
<author pid="03/6880">Francesca Saglietti</author>
<title>Technische Sicherheit und Informationssicherheit - Unterschiede und Gemeinsamkeiten.</title>
<pages>14-24</pages>
<year>2014</year>
<volume>37</volume>
<journal>Inform. Spektrum</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s00287-013-0748-2</ee>
<ee>https://www.wikidata.org/entity/Q56659311</ee>
<url>db/journals/insk/insk37.html#FreilingGGKMMRS14</url>
</article>
</r>
<r><inproceedings key="conf/dexaw/ZhuangPMF14" mdate="2023-03-24">
<author pid="02/5194">Yan Zhuang</author>
<author pid="140/0788">Mykola Protsenko</author>
<author pid="08/7968">Tilo M&#252;ller</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>An(other) Exercise in Measuring the Strength of Source Code Obfuscation.</title>
<pages>313-317</pages>
<year>2014</year>
<booktitle>DEXA Workshops</booktitle>
<ee>https://doi.org/10.1109/DEXA.2014.69</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/DEXA.2014.69</ee>
<crossref>conf/dexaw/2014</crossref>
<url>db/conf/dexaw/dexaw2014.html#ZhuangPMF14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/securecomm/FreilingPZ14" mdate="2017-05-23">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="140/0788">Mykola Protsenko</author>
<author pid="02/5194">Yan Zhuang</author>
<title>An Empirical Evaluation of Software Obfuscation Techniques Applied to Android APKs.</title>
<pages>315-328</pages>
<year>2014</year>
<booktitle>SecureComm (2)</booktitle>
<ee>https://doi.org/10.1007/978-3-319-23802-9_24</ee>
<crossref>conf/securecomm/2014-2</crossref>
<url>db/conf/securecomm/securecomm2014-2.html#FreilingPZ14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sicherheit/KurtzTF14" mdate="2023-07-04">
<author pid="133/2821-1">Andreas Kurtz 0001</author>
<author pid="145/1438">Markus Tro&#223;bach</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Snoop-it: Dynamische Analyse und Manipulation von Apple iOS Apps.</title>
<pages>13-23</pages>
<year>2014</year>
<booktitle>Sicherheit</booktitle>
<crossref>conf/sicherheit/2014</crossref>
<url>db/conf/sicherheit/sicherheit2014.html#KurtzTF14</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/20046</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings228/article19.html</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/sicherheit/HintzEBF14" mdate="2023-07-04">
<author pid="145/1413">Nadina Hintz</author>
<author pid="99/7357">Markus Engelberth</author>
<author pid="b/ZBenenson">Zinaida Benenson</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Phishing still works: Erfahrungen und Lehren aus der Durchf&#252;hrung von Phishing-Experimenten.</title>
<pages>37-51</pages>
<year>2014</year>
<booktitle>Sicherheit</booktitle>
<crossref>conf/sicherheit/2014</crossref>
<url>db/conf/sicherheit/sicherheit2014.html#HintzEBF14</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/20067</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings228/article18.html</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/sicherheit/BrodowskiDFKR14" mdate="2023-07-04">
<author pid="145/1426">Dominik Brodowski</author>
<author pid="30/7968">Andreas Dewald</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="145/1366">Steve Kov&#225;cs</author>
<author pid="145/1386">Martin Rieger</author>
<title>Drei Jahre Master Online Digitale Forensik: Ergebnisse und Erfahrungen.</title>
<pages>391-405</pages>
<year>2014</year>
<booktitle>Sicherheit</booktitle>
<crossref>conf/sicherheit/2014</crossref>
<url>db/conf/sicherheit/sicherheit2014.html#BrodowskiDFKR14</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/20059</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings228/article29.html</ee>
</inproceedings>
</r>
<r><proceedings key="conf/imf/2014" mdate="2019-10-16">
<editor pid="f/FCFreiling">Felix C. Freiling</editor>
<editor pid="31/7693">Holger Morgenstern</editor>
<editor pid="45/90">Sandra Frings</editor>
<editor pid="53/5309-1">Oliver G&#246;bel 0001</editor>
<editor pid="53/1105">Detlef G&#252;nther</editor>
<editor pid="25/5504">Jens Nedon</editor>
<editor pid="61/5686">Dirk Schadt</editor>
<title>Eighth International Conference on IT Security Incident Management &#38; IT Forensics, IMF 2014, M&#252;nster, Germany, May 12-14, 2014</title>
<publisher>IEEE Computer Society</publisher>
<year>2014</year>
<isbn>978-1-4799-4330-2</isbn>
<ee>https://ieeexplore.ieee.org/xpl/conhome/6823828/proceeding</ee>
<ee>http://www.computer.org/csdl/proceedings/imf/2014/4330/00/index.html</ee>
<booktitle>IMF</booktitle>
<url>db/conf/imf/imf2014.html</url>
</proceedings>
</r>
<r><article key="journals/pik/Freiling13" mdate="2021-04-29">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Im Fokus: Technische und menschliche Aspekte von Cyberkriminalit&#228;t.</title>
<pages>199-200</pages>
<year>2013</year>
<volume>36</volume>
<journal>Prax. Inf.verarb. Kommun.</journal>
<number>3</number>
<ee>https://doi.org/10.1515/pik-2013-0008</ee>
<url>db/journals/pik/pik36.html#Freiling13</url>
</article>
</r>
<r><inproceedings key="conf/fc/MullerSMF13" mdate="2017-05-26">
<author pid="08/7968">Tilo M&#252;ller</author>
<author pid="133/2365">Hans Spath</author>
<author pid="133/2417">Richard M&#228;ckl</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Stark - Tamperproof Authentication to Resist Keylogging.</title>
<pages>295-312</pages>
<year>2013</year>
<booktitle>Financial Cryptography</booktitle>
<ee>https://doi.org/10.1007/978-3-642-39884-1_25</ee>
<crossref>conf/fc/2013</crossref>
<url>db/conf/fc/fc2013.html#MullerSMF13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/imf/StuttgenDF13" mdate="2023-03-24">
<author pid="43/10985">Johannes St&#252;ttgen</author>
<author pid="30/7968">Andreas Dewald</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Selective Imaging Revisited.</title>
<pages>45-58</pages>
<year>2013</year>
<booktitle>IMF</booktitle>
<ee>https://doi.org/10.1109/IMF.2013.16</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/IMF.2013.16</ee>
<crossref>conf/imf/2013</crossref>
<url>db/conf/imf/imf2013.html#StuttgenDF13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/imf/WundramFM13" mdate="2023-03-24">
<author pid="133/5070">Martin Wundram</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="30/7693">Christian Moch</author>
<title>Anti-forensics: The Next Step in Digital Forensics Tool Testing.</title>
<pages>83-97</pages>
<year>2013</year>
<booktitle>IMF</booktitle>
<ee>https://doi.org/10.1109/IMF.2013.17</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/IMF.2013.17</ee>
<crossref>conf/imf/2013</crossref>
<url>db/conf/imf/imf2013.html#WundramFM13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/imf/KalberDF13" mdate="2023-03-24">
<author pid="133/5061">Sven K&#228;lber</author>
<author pid="30/7968">Andreas Dewald</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Forensic Application-Fingerprinting Based on File System Metadata.</title>
<pages>98-112</pages>
<year>2013</year>
<booktitle>IMF</booktitle>
<ee>https://doi.org/10.1109/IMF.2013.20</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/IMF.2013.20</ee>
<crossref>conf/imf/2013</crossref>
<url>db/conf/imf/imf2013.html#KalberDF13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/popl/ZwangerF13" mdate="2026-02-19">
<author pid="141/2003">Viviane Zwanger</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Kernel mode API spectroscopy for incident response and digital forensics.</title>
<pages>3:1-3:11</pages>
<year>2013</year>
<booktitle>PPREW@POPL</booktitle>
<ee type="oa">https://doi.org/10.1145/2430553.2430556</ee>
<crossref>conf/popl/2013pprew</crossref>
<url>db/conf/popl/pprew2013.html#ZwangerF13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sac/SpreitzenbarthFESH13" mdate="2021-07-25">
<author pid="33/8965">Michael Spreitzenbarth</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author orcid="0000-0002-7175-9503" pid="01/2452">Florian Echtler</author>
<author orcid="0000-0002-8960-6986" pid="71/1928">Thomas Schreck</author>
<author pid="34/8008">Johannes Hoffmann</author>
<title>Mobile-sandbox: having a deeper look into android applications.</title>
<pages>1808-1815</pages>
<year>2013</year>
<booktitle>SAC</booktitle>
<ee>https://doi.org/10.1145/2480362.2480701</ee>
<ee>https://www.wikidata.org/entity/Q56928875</ee>
<crossref>conf/sac/2013</crossref>
<url>db/conf/sac/sac2013.html#SpreitzenbarthFESH13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sin/AnikeevF13" mdate="2018-11-06">
<author orcid="0000-0002-4959-2663" pid="74/5976">Maxim Anikeev</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Preventing malicious data harvesting from deallocated memory areas.</title>
<pages>448-449</pages>
<year>2013</year>
<booktitle>SIN</booktitle>
<ee>https://doi.org/10.1145/2523514.2527022</ee>
<crossref>conf/sin/2013</crossref>
<url>db/conf/sin/sin2013.html#AnikeevF13</url>
</inproceedings>
</r>
<r><incollection key="books/others/13/DewaldFSSV13" mdate="2020-06-04">
<author pid="30/7968">Andreas Dewald</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="84/10985">Sven Schmitt</author>
<author pid="33/8965">Michael Spreitzenbarth</author>
<author pid="08/10001">Stefan V&#246;mel</author>
<title>Systematische Probleme und Grenzen der forensischen Informatik.</title>
<pages>101-118</pages>
<year>2013</year>
<booktitle>Jenseits von 1984</booktitle>
<crossref>books/others/13/G2013a</crossref>
<url>db/books/collections/G2013a.html#DewaldFSSV13</url>
</incollection>
</r>
<r><proceedings key="conf/imf/2013" mdate="2019-10-16">
<editor pid="31/7693">Holger Morgenstern</editor>
<editor pid="53/7693">Ralf Ehlert</editor>
<editor pid="f/FCFreiling">Felix C. Freiling</editor>
<editor pid="45/90">Sandra Frings</editor>
<editor pid="53/5309-1">Oliver G&#246;bel 0001</editor>
<editor pid="53/1105">Detlef G&#252;nther</editor>
<editor pid="91/1808">Stefan Kiltz</editor>
<editor pid="25/5504">Jens Nedon</editor>
<editor pid="61/5686">Dirk Schadt</editor>
<title>Seventh International Conference on IT Security Incident Management and IT Forensics, IMF 2013, Nuremberg, Germany, March 12-14, 2013</title>
<publisher>IEEE Computer Society</publisher>
<year>2013</year>
<isbn>978-1-4673-6307-5</isbn>
<ee>https://ieeexplore.ieee.org/xpl/conhome/6568360/proceeding</ee>
<ee>http://www.computer.org/csdl/proceedings/imf/2013/4955/00/index.html</ee>
<booktitle>IMF</booktitle>
<url>db/conf/imf/imf2013.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/dagstuhl-reports/FreilingHP13" mdate="2017-06-07">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="30/1501">Gerrit Hornung</author>
<author pid="85/10686">Radim Polc&#225;k</author>
<title>Forensic Computing (Dagstuhl Seminar 13482).</title>
<pages>193-208</pages>
<year>2013</year>
<volume>3</volume>
<journal>Dagstuhl Reports</journal>
<number>11</number>
<ee type="oa">https://doi.org/10.4230/DagRep.3.11.193</ee>
<url>db/journals/dagstuhl-reports/dagstuhl-reports3.html#FreilingHP13</url>
</article>
</r>
<r><article key="journals/di/VomelF12" mdate="2020-08-20">
<author pid="08/10001">Stefan V&#246;mel</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Correctness, atomicity, and integrity: Defining criteria for forensically-sound memory acquisition.</title>
<pages>125-137</pages>
<year>2012</year>
<volume>9</volume>
<journal>Digit. Investig.</journal>
<number>2</number>
<ee>https://doi.org/10.1016/j.diin.2012.04.005</ee>
<url>db/journals/di/di9.html#VomelF12</url>
</article>
</r>
<r><article key="journals/dud/BackerDFS12" mdate="2017-05-27">
<author pid="89/11329">Matthias B&#228;cker</author>
<author pid="30/7968">Andreas Dewald</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="84/10985">Sven Schmitt</author>
<title>Kriterien f&#252;r die Priorisierung bei der Sicherung und Analyse digitaler Spuren.</title>
<pages>597-602</pages>
<year>2012</year>
<volume>36</volume>
<journal>Datenschutz und Datensicherheit</journal>
<number>8</number>
<ee>https://doi.org/10.1007/s11623-012-0187-2</ee>
<url>db/journals/dud/dud36.html#BackerDFS12</url>
</article>
</r>
<r><article key="journals/it/WillemsF12" mdate="2020-03-06">
<author pid="85/3643">Carsten Willems</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Reverse Code Engineering - State of the Art and Countermeasures.</title>
<pages>53-63</pages>
<year>2012</year>
<volume>54</volume>
<journal>it Inf. Technol.</journal>
<number>2</number>
<ee>https://doi.org/10.1524/itit.2012.0664</ee>
<url>db/journals/it/it54.html#WillemsF12</url>
</article>
</r>
<r><article key="journals/tdsc/CortinasFGLLPA12" mdate="2021-10-14">
<author orcid="0000-0003-1455-1703" pid="67/827">Roberto Corti&#241;as</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="43/1807">Marjan Ghajar-Azadanlou</author>
<author pid="29/3916">Alberto Lafuente</author>
<author orcid="0000-0003-4711-7110" pid="l/MikelLarrea">Mikel Larrea</author>
<author pid="p/LuciaDPenso">Lucia Draque Penso</author>
<author orcid="0000-0002-0901-4172" pid="97/6338">Iratxe Soraluze Arriola</author>
<title>Secure Failure Detection and Consensus in TrustedPals.</title>
<pages>610-625</pages>
<year>2012</year>
<volume>9</volume>
<journal>IEEE Trans. Dependable Secur. Comput.</journal>
<number>4</number>
<ee>https://doi.org/10.1109/TDSC.2012.23</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TDSC.2012.23</ee>
<url>db/journals/tdsc/tdsc9.html#CortinasFGLLPA12</url>
</article>
</r>
<r><inproceedings key="conf/acns/MullerTF12" mdate="2019-08-20">
<author pid="08/7968">Tilo M&#252;ller</author>
<author pid="34/11538">Benjamin Taubmann</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>TreVisor - OS-Independent Software-Based Full Disk Encryption Secure against Main Memory Attacks.</title>
<pages>66-83</pages>
<year>2012</year>
<booktitle>ACNS</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-31284-7_5</ee>
<crossref>conf/acns/2012</crossref>
<url>db/conf/acns/acns2012.html#MullerTF12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acsac/WillemsFH12" mdate="2019-09-25">
<author pid="85/3643">Carsten Willems</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author orcid="0000-0002-2783-1264" pid="h/ThorstenHolz">Thorsten Holz</author>
<title>Using memory management to detect and extract illegitimate code for malware analysis.</title>
<pages>179-188</pages>
<year>2012</year>
<booktitle>ACSAC</booktitle>
<ee>https://doi.org/10.1145/2420950.2420979</ee>
<crossref>conf/acsac/2012</crossref>
<url>db/conf/acsac/acsac2012.html#WillemsFH12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/edoc/AtkinsonBGFSHMM12" mdate="2023-03-24">
<author orcid="0000-0002-3164-5595" pid="a/ColinAtkinson">Colin Atkinson 0001</author>
<author pid="49/9612">Florian Barth</author>
<author pid="57/11440">Ralph Gerbig</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="43/11495">Sebastian Schinzel</author>
<author pid="124/3770">Frank Hadasch</author>
<author orcid="0000-0001-6546-4816" pid="34/590">Alexander Maedche</author>
<author pid="16/7215">Benjamin M&#252;ller 0001</author>
<title>Reducing the Incidence of Unintended, Human-Caused Information Flows in Enterprise Systems.</title>
<pages>11-18</pages>
<year>2012</year>
<booktitle>EDOC Workshops</booktitle>
<ee>https://doi.org/10.1109/EDOCW.2012.12</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/EDOCW.2012.12</ee>
<ee>https://www.wikidata.org/entity/Q57400936</ee>
<crossref>conf/edoc/2012w</crossref>
<url>db/conf/edoc/edoc2012w.html#AtkinsonBGFSHMM12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ifip11-9/SpreitzenbarthSF12" mdate="2018-06-26">
<author pid="33/8965">Michael Spreitzenbarth</author>
<author pid="84/10985">Sven Schmitt</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Comparing Sources of Location Data from Android Smartphones.</title>
<pages>143-157</pages>
<year>2012</year>
<booktitle>IFIP Int. Conf. Digital Forensics</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-33962-2_10</ee>
<crossref>conf/ifip11-9/2012</crossref>
<url>db/conf/ifip11-9/df2012.html#SpreitzenbarthSF12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sicherheit/DewaldFSSSVW12" mdate="2023-07-04">
<author pid="30/7968">Andreas Dewald</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="71/1928">Thomas Schreck</author>
<author pid="33/8965">Michael Spreitzenbarth</author>
<author pid="43/10985">Johannes St&#252;ttgen</author>
<author pid="08/10001">Stefan V&#246;mel</author>
<author pid="85/3643">Carsten Willems</author>
<title>Analyse und Vergleich von BckR2D2-I und II.</title>
<pages>47-58</pages>
<year>2012</year>
<booktitle>Sicherheit</booktitle>
<crossref>conf/sicherheit/2012</crossref>
<url>db/conf/sicherheit/sicherheit2012.html#DewaldFSSSVW12</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/18287</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings195/article6612.html</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/sicherheit/ZimmermannSSF12" mdate="2023-07-04">
<author pid="65/863">Christian Zimmermann</author>
<author pid="33/8965">Michael Spreitzenbarth</author>
<author pid="84/10985">Sven Schmitt</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Forensic Analysis of YAFFS2.</title>
<pages>59-69</pages>
<year>2012</year>
<booktitle>Sicherheit</booktitle>
<crossref>conf/sicherheit/2012</crossref>
<url>db/conf/sicherheit/sicherheit2012.html#ZimmermannSSF12</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/18263</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings195/article6619.html</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/sicherheit/EngelberthGSF12" mdate="2023-07-04">
<author pid="99/7357">Markus Engelberth</author>
<author pid="18/1333">Jan G&#246;bel</author>
<author pid="45/10983">Christian Sch&#246;nbein</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>PyBox - A Python Sandbox.</title>
<pages>137-148</pages>
<year>2012</year>
<booktitle>Sicherheit</booktitle>
<crossref>conf/sicherheit/2012</crossref>
<url>db/conf/sicherheit/sicherheit2012.html#EngelberthGSF12</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/18269</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings195/article6599.html</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/sicherheit/TriniusF12" mdate="2023-07-04">
<author pid="45/7272">Philipp Trinius</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Filtern von Spam-Nachrichten mit kontextfreien Grammatiken.</title>
<pages>163-174</pages>
<year>2012</year>
<booktitle>Sicherheit</booktitle>
<crossref>conf/sicherheit/2012</crossref>
<url>db/conf/sicherheit/sicherheit2012.html#TriniusF12</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/18271</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings195/article6601.html</ee>
</inproceedings>
</r>
<r><proceedings key="conf/isw/2012" mdate="2019-05-14">
<editor pid="39/5760">Dieter Gollmann</editor>
<editor pid="f/FCFreiling">Felix C. Freiling</editor>
<title>Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings</title>
<volume>7483</volume>
<year>2012</year>
<publisher>Springer</publisher>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<ee>https://doi.org/10.1007/978-3-642-33383-5</ee>
<isbn>978-3-642-33382-8</isbn>
<booktitle>ISC</booktitle>
<url>db/conf/isw/isc2012.html</url>
</proceedings>
</r>
<r><book key="books/daglib/0029558" mdate="2020-12-07">
<author pid="30/7968">Andreas Dewald</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Forensische Informatik.</title>
<pages>I-VIII, 1-123</pages>
<publisher>Books on Demand GmbH</publisher>
<year>2011</year>
<isbn>978-3-8423-7947-3</isbn>
<ee type="archive">http://www.bod.de/index.php?id=296&#38;objk_id=572434</ee>
</book>
</r>
<r><article key="journals/csur/FreilingGK11" mdate="2022-12-07">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author orcid="0000-0002-4794-8902" pid="g/RachidGuerraoui">Rachid Guerraoui</author>
<author pid="k/PetrKouznetsov">Petr Kuznetsov</author>
<title>The failure detector abstraction.</title>
<pages>9:1-9:40</pages>
<year>2011</year>
<volume>43</volume>
<journal>ACM Comput. Surv.</journal>
<number>2</number>
<ee>https://doi.org/10.1145/1883612.1883616</ee>
<url>db/journals/csur/csur43.html#FreilingGK11</url>
</article>
</r>
<r><article key="journals/di/VomelF11" mdate="2020-08-20">
<author pid="08/10001">Stefan V&#246;mel</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>A survey of main memory acquisition and analysis techniques for the windows operating system.</title>
<pages>3-22</pages>
<year>2011</year>
<volume>8</volume>
<journal>Digit. Investig.</journal>
<number>1</number>
<ee>https://doi.org/10.1016/j.diin.2011.06.002</ee>
<url>db/journals/di/di8.html#VomelF11</url>
</article>
</r>
<r><article key="journals/dud/EngelberthFGGHHTW11" mdate="2019-09-25">
<author pid="99/7357">Markus Engelberth</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="18/1333">Jan G&#246;bel</author>
<author pid="01/2220">Christian Gorecki</author>
<author orcid="0000-0002-2783-1264" pid="h/ThorstenHolz">Thorsten Holz</author>
<author pid="01/8882">Ralf Hund</author>
<author pid="45/7272">Philipp Trinius</author>
<author pid="85/3643">Carsten Willems</author>
<title>Das Internet-Malware-Analyse-System (InMAS) - Ein System zur gro&#223;fl&#228;chigen Sammlung und Analyse von Schadsoftware im Internet.</title>
<pages>247-252</pages>
<year>2011</year>
<volume>35</volume>
<journal>Datenschutz und Datensicherheit</journal>
<number>4</number>
<ee>https://doi.org/10.1007/s11623-011-0061-7</ee>
<url>db/journals/dud/dud35.html#EngelberthFGGHHTW11</url>
</article>
</r>
<r><article key="journals/ipl/ArriolaCLLF11" mdate="2021-10-14">
<author orcid="0000-0002-0901-4172" pid="97/6338">Iratxe Soraluze Arriola</author>
<author orcid="0000-0003-1455-1703" pid="67/827">Roberto Corti&#241;as</author>
<author pid="29/3916">Alberto Lafuente</author>
<author orcid="0000-0003-4711-7110" pid="l/MikelLarrea">Mikel Larrea</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Communication-efficient failure detection and consensus in omission environments.</title>
<pages>262-268</pages>
<year>2011</year>
<volume>111</volume>
<journal>Inf. Process. Lett.</journal>
<number>6</number>
<ee>https://doi.org/10.1016/j.ipl.2010.12.008</ee>
<url>db/journals/ipl/ipl111.html#ArriolaCLLF11</url>
</article>
</r>
<r><inproceedings key="conf/badgers/RossowDBCSFP11" mdate="2023-08-11">
<author pid="08/6024">Christian Rossow</author>
<author pid="30/5956-5">Christian J. Dietrich</author>
<author orcid="0000-0001-6179-1510" pid="91/800">Herbert Bos</author>
<author orcid="0000-0002-3878-2680" pid="95/5162">Lorenzo Cavallaro</author>
<author orcid="0000-0002-5113-2746" pid="s/MaartenvanSteen">Maarten van Steen</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="30/6630">Norbert Pohlmann</author>
<title>Sandnet: network traffic analysis of malicious software.</title>
<pages>78-88</pages>
<year>2011</year>
<booktitle>BADGERS@EuroSys</booktitle>
<ee>https://doi.org/10.1145/1978672.1978682</ee>
<crossref>conf/badgers/2011</crossref>
<url>db/conf/badgers/badgers2011.html#RossowDBCSFP11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dimva/BenensonDEFMMVS11" mdate="2023-03-23">
<author pid="b/ZBenenson">Zinaida Benenson</author>
<author pid="30/7968">Andreas Dewald</author>
<author pid="79/814">Hans-Georg E&#223;er</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="08/7968">Tilo M&#252;ller</author>
<author pid="30/7693">Christian Moch</author>
<author pid="08/10001">Stefan V&#246;mel</author>
<author pid="43/11495">Sebastian Schinzel</author>
<author pid="33/8965">Michael Spreitzenbarth</author>
<author pid="136/8343">Ben Stock</author>
<author pid="43/10985">Johannes St&#252;ttgen</author>
<title>Exploring the Landscape of Cybercrime.</title>
<pages>71-74</pages>
<year>2011</year>
<booktitle>SysSec@DIMVA</booktitle>
<ee>https://doi.ieeecomputersociety.org/10.1109/SysSec.2011.23</ee>
<crossref>conf/dimva/2011syssec</crossref>
<url>db/conf/dimva/syssec2011.html#BenensonDEFMMVS11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ec2nd/DietrichRFBSP11" mdate="2023-03-24">
<author pid="30/5956-5">Christian J. Dietrich</author>
<author pid="08/6024">Christian Rossow</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author orcid="0000-0001-6179-1510" pid="91/800">Herbert Bos</author>
<author orcid="0000-0002-5113-2746" pid="s/MaartenvanSteen">Maarten van Steen</author>
<author pid="30/6630">Norbert Pohlmann</author>
<title>On Botnets That Use DNS for Command and Control.</title>
<pages>9-16</pages>
<year>2011</year>
<booktitle>EC2ND</booktitle>
<ee>https://doi.org/10.1109/EC2ND.2011.16</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/EC2ND.2011.16</ee>
<crossref>conf/ec2nd/2011</crossref>
<url>db/conf/ec2nd/ec2nd2011.html#DietrichRFBSP11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/gi/KnausSGEF11" mdate="2023-07-04">
<author pid="211/0367">Alexander Knaus</author>
<author pid="43/10985">Johannes St&#252;ttgen</author>
<author pid="18/1333">Jan G&#246;bel</author>
<author pid="99/7357">Markus Engelberth</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>S&#228;uberung eines infizierten Windows-Betriebssystems auf Basis von Malware-Analyse-Berichten.</title>
<pages>114</pages>
<year>2011</year>
<booktitle>GI-Jahrestagung</booktitle>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/18838</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings192/article203.html</ee>
<crossref>conf/gi/2011</crossref>
<url>db/conf/gi/gi2011.html#KnausSGEF11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/gi/JawurekF11" mdate="2023-07-04">
<author pid="97/1430">Marek Jawurek</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Privacy threat analysis of smart metering.</title>
<pages>318</pages>
<year>2011</year>
<booktitle>GI-Jahrestagung</booktitle>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/18665</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings192/article125.html</ee>
<crossref>conf/gi/2011</crossref>
<url>db/conf/gi/gi2011.html#JawurekF11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icdf2c/MochF11" mdate="2017-05-24">
<author pid="30/7693">Christian Moch</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Evaluating the Forensic Image Generator Generator.</title>
<pages>238-252</pages>
<year>2011</year>
<booktitle>ICDF2C</booktitle>
<ee>https://doi.org/10.1007/978-3-642-35515-8_20</ee>
<ee>http://eudl.eu/doi/10.1007/978-3-642-35515-8_20</ee>
<crossref>conf/icdf2c/2011</crossref>
<url>db/conf/icdf2c/icdf2c2011.html#MochF11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/imf/DewaldFW11" mdate="2023-03-24">
<author pid="30/7968">Andreas Dewald</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="118/1817">Tim Weber</author>
<title>Design and Implementation of a Documentation Tool for Interactive Commandline Sessions.</title>
<pages>62-80</pages>
<year>2011</year>
<booktitle>IMF</booktitle>
<ee>https://doi.org/10.1109/IMF.2011.17</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/IMF.2011.17</ee>
<crossref>conf/imf/2011</crossref>
<url>db/conf/imf/imf2011.html#DewaldFW11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sec/FreilingS11" mdate="2018-06-26">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="43/11495">Sebastian Schinzel</author>
<title>Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications.</title>
<pages>41-55</pages>
<year>2011</year>
<booktitle>SEC</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-21424-0_4</ee>
<crossref>conf/sec/2011</crossref>
<url>db/conf/sec/sec2011.html#FreilingS11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sec/AlsbihFS11" mdate="2018-06-26">
<author pid="00/11333">Amir Alsbih</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="s/ChristianSchindelhauer">Christian Schindelhauer</author>
<title>A Case Study in Practical Security of Cable Networks.</title>
<pages>92-103</pages>
<year>2011</year>
<booktitle>SEC</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-21424-0_8</ee>
<crossref>conf/sec/2011</crossref>
<url>db/conf/sec/sec2011.html#AlsbihFS11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/BecherFHHUW11" mdate="2023-03-24">
<author pid="68/1453">Michael Becher</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="34/8008">Johannes Hoffmann</author>
<author orcid="0000-0002-2783-1264" pid="h/ThorstenHolz">Thorsten Holz</author>
<author pid="49/10074">Sebastian Uellenbeck</author>
<author pid="36/2907">Christopher Wolf</author>
<title>Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices.</title>
<pages>96-111</pages>
<year>2011</year>
<booktitle>IEEE Symposium on Security and Privacy</booktitle>
<ee>https://doi.org/10.1109/SP.2011.29</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SP.2011.29</ee>
<ee>https://www.wikidata.org/entity/Q57486298</ee>
<crossref>conf/sp/2011</crossref>
<url>db/conf/sp/sp2011.html#BecherFHHUW11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sss/GoreckiFKH11" mdate="2019-09-25">
<author pid="01/2220">Christian Gorecki</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="85/10265">Marc K&#252;hrer</author>
<author orcid="0000-0002-2783-1264" pid="h/ThorstenHolz">Thorsten Holz</author>
<title>TrumanBox: Improving Dynamic Malware Analysis by Emulating the Internet.</title>
<pages>208-222</pages>
<year>2011</year>
<booktitle>SSS</booktitle>
<ee>https://doi.org/10.1007/978-3-642-24550-3_17</ee>
<crossref>conf/sss/2011</crossref>
<url>db/conf/sss/sss2011.html#GoreckiFKH11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/MullerFD11" mdate="2020-03-12">
<author pid="08/7968">Tilo M&#252;ller</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="30/7968">Andreas Dewald</author>
<title>TRESOR Runs Encryption Securely Outside RAM.</title>
<year>2011</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">http://static.usenix.org/events/sec11/tech/full_papers/Muller.pdf</ee>
<crossref>conf/uss/2011</crossref>
<url>db/conf/uss/uss2011.html#MullerFD11</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/dagstuhl-reports/FreilingHPP11" mdate="2017-06-07">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="08/9190">Dirk Heckmann</author>
<author pid="85/10686">Radim Polc&#225;k</author>
<author pid="p/JPosegga">Joachim Posegga</author>
<title>Forensic Computing (Dagstuhl Seminar 11401).</title>
<pages>1-13</pages>
<year>2011</year>
<volume>1</volume>
<journal>Dagstuhl Reports</journal>
<number>10</number>
<ee type="oa">https://doi.org/10.4230/DagRep.1.10.1</ee>
<url>db/journals/dagstuhl-reports/dagstuhl-reports1.html#FreilingHPP11</url>
</article>
</r>
<r><article key="journals/ahswn/BestehornBBJBF10" mdate="2020-04-25">
<author pid="49/5026">Markus Bestehorn</author>
<author pid="b/ZBenenson">Zinaida Benenson</author>
<author pid="11/226">Erik Buchmann</author>
<author pid="97/1430">Marek Jawurek</author>
<author pid="b/KBohm">Klemens B&#246;hm</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Query Dissemination in Sensor Networks - Predicting Reachability and Energy Consumption.</title>
<pages>85-107</pages>
<year>2010</year>
<volume>9</volume>
<journal>Ad Hoc Sens. Wirel. Networks</journal>
<number>1-2</number>
<ee>http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-9-number-1-2/ahswn-9-1-2-p-85-107/</ee>
<url>db/journals/ahswn/ahswn9.html#BestehornBBJBF10</url>
</article>
</r>
<r><article key="journals/dud/BackerFS10" mdate="2017-05-27">
<author pid="89/11329">Matthias B&#228;cker</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="84/10985">Sven Schmitt</author>
<title>Selektion vor der Sicherung - Methoden zur effizienten forensischen Sicherung von digitalen Speichermedien.</title>
<pages>80-85</pages>
<year>2010</year>
<volume>34</volume>
<journal>Datenschutz und Datensicherheit</journal>
<number>2</number>
<ee>https://doi.org/10.1007/s11623-010-0040-4</ee>
<url>db/journals/dud/dud34.html#BackerFS10</url>
</article>
</r>
<r><article key="journals/it/BenensonBF10" mdate="2020-03-06">
<author pid="b/ZBenenson">Zinaida Benenson</author>
<author pid="14/2769">Erik-Oliver Bla&#223;</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Attacker Models for Wireless Sensor Networks (Angreifermodelle f&#252;r drahtlose Sensornetze).</title>
<pages>320-324</pages>
<year>2010</year>
<volume>52</volume>
<journal>it Inf. Technol.</journal>
<number>6</number>
<ee>https://doi.org/10.1524/itit.2010.0609</ee>
<url>db/journals/it/it52.html#BenensonBF10</url>
</article>
</r>
<r><article key="journals/wc/KrontirisFD10" mdate="2020-03-24">
<author pid="32/1264">Ioannis Krontiris</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="18/4520">Tassos Dimitriou</author>
<title>Location privacy in urban sensing networks: research challenges and directions.</title>
<pages>30-35</pages>
<year>2010</year>
<volume>17</volume>
<journal>IEEE Wirel. Commun.</journal>
<number>5</number>
<ee>https://doi.org/10.1109/MWC.2010.5601955</ee>
<url>db/journals/wc/wc17.html#KrontirisFD10</url>
</article>
</r>
<r><inproceedings key="conf/IEEEias/MuterGF10" mdate="2017-05-17">
<author pid="66/11147">Michael M&#252;ter</author>
<author pid="44/11349">Andr&#233; Groll</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>A structured approach to anomaly detection for in-vehicle networks.</title>
<pages>92-98</pages>
<year>2010</year>
<booktitle>IAS</booktitle>
<ee>https://doi.org/10.1109/ISIAS.2010.5604050</ee>
<crossref>conf/IEEEias/2010</crossref>
<url>db/conf/IEEEias/IEEEias2010.html#MuterGF10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurosec/MullerDF10" mdate="2018-11-06">
<author pid="08/7968">Tilo M&#252;ller</author>
<author pid="30/7968">Andreas Dewald</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>AESSE: a cold-boot resistant implementation of AES.</title>
<pages>42-47</pages>
<year>2010</year>
<booktitle>EUROSEC</booktitle>
<ee>https://doi.org/10.1145/1752046.1752053</ee>
<crossref>conf/eurosec/2010</crossref>
<url>db/conf/eurosec/eurosec2010.html#MullerDF10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/percom/KrontirisF10" mdate="2023-03-24">
<author pid="32/1264">Ioannis Krontiris</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Integrating people-centric sensing with social networks: A privacy research agenda.</title>
<pages>620-623</pages>
<year>2010</year>
<booktitle>PerCom Workshops</booktitle>
<ee>https://doi.org/10.1109/PERCOMW.2010.5470510</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/PERCOMW.2010.5470510</ee>
<crossref>conf/percom/2010w</crossref>
<url>db/conf/percom/percomw2010.html#KrontirisF10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sac/DewaldHF10" mdate="2025-01-19">
<author pid="30/7968">Andreas Dewald</author>
<author orcid="0000-0002-2783-1264" pid="h/ThorstenHolz">Thorsten Holz</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>ADSandbox: sandboxing JavaScript to fight malicious websites.</title>
<pages>1859-1864</pages>
<year>2010</year>
<booktitle>SAC</booktitle>
<ee>https://doi.org/10.1145/1774088.1774482</ee>
<ee>https://www.wikidata.org/entity/Q131113111</ee>
<crossref>conf/sac/2010</crossref>
<url>db/conf/sac/sac2010.html#DewaldHF10</url>
</inproceedings>
</r>
<r><proceedings key="conf/sicherheit/2010" mdate="2021-01-13">
<editor pid="f/FCFreiling">Felix C. Freiling</editor>
<title>Sicherheit 2010: Sicherheit, Schutz und Zuverl&#228;ssigkeit, Beitr&#228;ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f&#252;r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin.</title>
<isbn>978-3-88579-264-2</isbn>
<booktitle>Sicherheit</booktitle>
<series href="db/series/lni/index.html">LNI</series>
<volume>P-170</volume>
<publisher>GI</publisher>
<year>2010</year>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/19974</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings170.html</ee>
<url>db/conf/sicherheit/sicherheit2010.html</url>
</proceedings>
</r>
<r><article key="journals/dud/Freiling09" mdate="2017-05-27">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Ein Blick auf IT-Sicherheit aus Angreiferperspektive - Vom Wert offensiver Methoden.</title>
<pages>214-217</pages>
<year>2009</year>
<volume>33</volume>
<journal>Datenschutz und Datensicherheit</journal>
<number>4</number>
<ee>https://doi.org/10.1007/s11623-009-0053-z</ee>
<url>db/journals/dud/dud33.html#Freiling09</url>
</article>
</r>
<r><article key="journals/dud/LieglMF09" mdate="2017-05-27">
<author pid="60/11331">Marion Liegl</author>
<author pid="55/901">Martin Mink</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Datenschutz in digital-forensischen Lehrveranstaltungen - Sicherer Umgang mit pers&#246;nlichen Daten.</title>
<pages>222-227</pages>
<year>2009</year>
<volume>33</volume>
<journal>Datenschutz und Datensicherheit</journal>
<number>4</number>
<ee>https://doi.org/10.1007/s11623-009-0055-x</ee>
<url>db/journals/dud/dud33.html#LieglMF09</url>
</article>
</r>
<r><article key="journals/dud/FreilingH09" mdate="2017-05-27">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="87/7271">Dennis Heinson</author>
<title>Probleme des Verkehrsdatenbegriffs im Rahmen der Vorratsdatenspeicherung.</title>
<pages>547-552</pages>
<year>2009</year>
<volume>33</volume>
<journal>Datenschutz und Datensicherheit</journal>
<number>9</number>
<ee>https://doi.org/10.1007/s11623-009-0141-0</ee>
<url>db/journals/dud/dud33.html#FreilingH09</url>
</article>
</r>
<r><article key="journals/pik/WilkeBFZ09" mdate="2021-04-29">
<author pid="66/9806">Joachim Wilke</author>
<author pid="14/2769">Erik-Oliver Bla&#223;</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="z/MZitterbart">Martina Zitterbart</author>
<title>A Framework for Probabilistic, Authentic Aggregation in Wireless Sensor Networks.</title>
<pages>116-126</pages>
<year>2009</year>
<volume>32</volume>
<journal>Prax. Inf.verarb. Kommun.</journal>
<number>2</number>
<ee>https://doi.org/10.1515/piko.2009.0021</ee>
<url>db/journals/pik/pik32.html#WilkeBFZ09</url>
</article>
</r>
<r><article key="journals/tcs/MittalPF09" mdate="2021-02-17">
<author pid="11/5490">Neeraj Mittal</author>
<author pid="02/732">Kuppahalli L. Phaneesh</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Safe termination detection in an asynchronous distributed system when processes may crash and recover.</title>
<pages>614-628</pages>
<year>2009</year>
<volume>410</volume>
<journal>Theor. Comput. Sci.</journal>
<number>6-7</number>
<ee type="oa">https://doi.org/10.1016/j.tcs.2008.10.011</ee>
<url>db/journals/tcs/tcs410.html#MittalPF09</url>
</article>
</r>
<r><inproceedings key="conf/esorics/HolzEF09" mdate="2019-09-25">
<author orcid="0000-0002-2783-1264" pid="h/ThorstenHolz">Thorsten Holz</author>
<author pid="99/7357">Markus Engelberth</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones.</title>
<pages>1-18</pages>
<year>2009</year>
<booktitle>ESORICS</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-04444-1_1</ee>
<crossref>conf/esorics/2009</crossref>
<url>db/conf/esorics/esorics2009.html#HolzEF09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ewsn/KrontirisBGFD09" mdate="2025-04-01">
<author pid="32/1264">Ioannis Krontiris</author>
<author pid="b/ZBenenson">Zinaida Benenson</author>
<author orcid="0000-0003-0663-2263" pid="96/1667">Thanassis Giannetsos</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="18/4520">Tassos Dimitriou</author>
<title>Cooperative Intrusion Detection in Wireless Sensor Networks.</title>
<pages>263-278</pages>
<year>2009</year>
<booktitle>EWSN</booktitle>
<ee>https://doi.org/10.1007/978-3-642-00224-3_17</ee>
<crossref>conf/ewsn/2009</crossref>
<url>db/conf/ewsn/ewsn2009.html#KrontirisBGFD09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/gi/HolzEF09" mdate="2023-07-04">
<author pid="h/ThorstenHolz">Thorsten Holz</author>
<author pid="99/7357">Markus Engelberth</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Eine Analyse von 33 Gigabyte gestohlener Keylogger-Daten.</title>
<pages>193</pages>
<year>2009</year>
<booktitle>GI Jahrestagung</booktitle>
<crossref>conf/gi/2009</crossref>
<url>db/conf/gi/gi2009.html#HolzEF09</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/31136</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings154/article2674.html</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/gi/BohmeFGK09" mdate="2023-07-04">
<author pid="52/6295">Rainer B&#246;hme</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="11/4347">Thomas Gloe</author>
<author pid="97/1874">Matthias Kirchner</author>
<title>Multimedia-Forensik als Teildisziplin der digitalen Forensik.</title>
<pages>1537-1551</pages>
<year>2009</year>
<booktitle>GI Jahrestagung</booktitle>
<crossref>conf/gi/2009</crossref>
<url>db/conf/gi/gi2009.html#BohmeFGK09</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/31114</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings154/article2656.html</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/imf/MochF09" mdate="2023-03-24">
<author pid="30/7693">Christian Moch</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>The Forensic Image Generator Generator (Forensig2).</title>
<pages>78-93</pages>
<year>2009</year>
<booktitle>IMF</booktitle>
<ee>https://doi.org/10.1109/IMF.2009.8</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/IMF.2009.8</ee>
<crossref>conf/imf/2009</crossref>
<url>db/conf/imf/imf2009.html#MochF09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ipps/Delporte-GalletFTFK09" mdate="2023-03-24">
<author pid="d/CDelporteGallet">Carole Delporte-Gallet</author>
<author pid="12/7013">Hugues Fauconnier</author>
<author pid="18/992">Andreas Tielmann</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="73/7434">Mahir Kilic</author>
<title>Message-efficient omission-tolerant consensus with limited synchrony.</title>
<pages>1-8</pages>
<year>2009</year>
<booktitle>IPDPS</booktitle>
<ee>https://doi.org/10.1109/IPDPS.2009.5160899</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/IPDPS.2009.5160899</ee>
<crossref>conf/ipps/2009</crossref>
<url>db/conf/ipps/ipdps2009.html#Delporte-GalletFTFK09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iwcf/BohmeFGK09" mdate="2017-05-26">
<author pid="52/6295">Rainer B&#246;hme</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="11/4347">Thomas Gloe</author>
<author pid="97/1874">Matthias Kirchner</author>
<title>Multimedia Forensics Is Not Computer Forensics.</title>
<pages>90-103</pages>
<year>2009</year>
<booktitle>IWCF</booktitle>
<ee>https://doi.org/10.1007/978-3-642-03521-0_9</ee>
<crossref>conf/iwcf/2009</crossref>
<url>db/conf/iwcf/iwcf2009.html#BohmeFGK09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pdcat/FreilingLM09" mdate="2023-03-24">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="53/5762">Christian Lambertz</author>
<author pid="70/3602">Mila E. Majster-Cederbaum</author>
<title>Modular Consensus Algorithms for the Crash-Recovery Model.</title>
<pages>287-292</pages>
<year>2009</year>
<booktitle>PDCAT</booktitle>
<ee>https://doi.org/10.1109/PDCAT.2009.50</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/PDCAT.2009.50</ee>
<crossref>conf/pdcat/2009</crossref>
<url>db/conf/pdcat/pdcat2009.html#FreilingLM09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/HundHF09" mdate="2020-03-12">
<author pid="01/8882">Ralf Hund</author>
<author pid="h/ThorstenHolz">Thorsten Holz</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms.</title>
<pages>383-398</pages>
<year>2009</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">http://www.usenix.org/events/sec09/tech/full_papers/hund.pdf</ee>
<crossref>conf/uss/2009</crossref>
<url>db/conf/uss/uss2009.html#HundHF09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vizsec/TriniusHGF09" mdate="2023-03-24">
<author pid="45/7272">Philipp Trinius</author>
<author orcid="0000-0002-2783-1264" pid="h/ThorstenHolz">Thorsten Holz</author>
<author pid="18/1333">Jan G&#246;bel</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Visual analysis of malware behavior using treemaps and thread graphs.</title>
<pages>33-38</pages>
<year>2009</year>
<booktitle>VizSEC</booktitle>
<ee>https://doi.org/10.1109/VIZSEC.2009.5375540</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2009.5375540</ee>
<crossref>conf/vizsec/2009</crossref>
<url>db/conf/vizsec/vizsec2009.html#TriniusHGF09</url>
</inproceedings>
</r>
<r><article key="journals/jpdc/MittalFVP08" mdate="2020-02-22">
<author pid="11/5490">Neeraj Mittal</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="43/5587-1">Subbarayan Venkatesan</author>
<author pid="p/LuciaDPenso">Lucia Draque Penso</author>
<title>On termination detection in crash-prone distributed systems with failure detectors.</title>
<pages>855-875</pages>
<year>2008</year>
<volume>68</volume>
<journal>J. Parallel Distributed Comput.</journal>
<number>6</number>
<ee>https://doi.org/10.1016/j.jpdc.2008.02.001</ee>
<url>db/journals/jpdc/jpdc68.html#MittalFVP08</url>
</article>
</r>
<r><inproceedings key="conf/adhoc-now/BenensonBBFJ08" mdate="2017-05-25">
<author pid="b/ZBenenson">Zinaida Benenson</author>
<author pid="49/5026">Markus Bestehorn</author>
<author pid="11/226">Erik Buchmann</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="97/1430">Marek Jawurek</author>
<title>Query Dissemination with Predictable Reachability and Energy Usage in Sensor Networks.</title>
<pages>279-292</pages>
<year>2008</year>
<booktitle>ADHOC-NOW</booktitle>
<ee>https://doi.org/10.1007/978-3-540-85209-4_22</ee>
<crossref>conf/adhoc-now/2008</crossref>
<url>db/conf/adhoc-now/adhoc-now2008.html#BenensonBBFJ08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/imf/FreilingHM08" mdate="2023-07-04">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="h/ThorstenHolz">Thorsten Holz</author>
<author pid="55/901">Martin Mink</author>
<title>Reconstructing People's Lives: A Case Study in Teaching Forensic Computing.</title>
<pages>125-141</pages>
<year>2008</year>
<booktitle>IMF</booktitle>
<crossref>conf/imf/2008</crossref>
<url>db/conf/imf/imf2008.html#FreilingHM08</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/23588</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings140/article2299.html</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/ndss/HolzGRF08" mdate="2021-02-01">
<author pid="h/ThorstenHolz">Thorsten Holz</author>
<author pid="01/2220">Christian Gorecki</author>
<author pid="64/4020">Konrad Rieck</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Measuring and Detecting Fast-Flux Service Networks.</title>
<year>2008</year>
<booktitle>NDSS</booktitle>
<ee type="oa">https://www.ndss-symposium.org/ndss2008/measuring-and-detecting-fast-flux-service-networks/</ee>
<crossref>conf/ndss/2008</crossref>
<url>db/conf/ndss/ndss2008.html#HolzGRF08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/nsdi/HolzSDBF08" mdate="2021-04-26">
<author pid="h/ThorstenHolz">Thorsten Holz</author>
<author pid="31/2767">Moritz Steiner</author>
<author pid="95/6905">Frederic Dahl</author>
<author pid="e/ErnstWBiersack">Ernst W. Biersack</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm.</title>
<year>2008</year>
<booktitle>LEET</booktitle>
<ee type="oa">http://www.usenix.org/events/leet08/tech/full_papers/holz/holz.pdf</ee>
<crossref>conf/nsdi/2008leet</crossref>
<url>db/conf/nsdi/leet2008.html#HolzSDBF08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sicherheit/IkinciHF08" mdate="2023-07-04">
<author pid="10/3855">Ali Ikinci</author>
<author pid="h/ThorstenHolz">Thorsten Holz</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients.</title>
<pages>407-421</pages>
<year>2008</year>
<booktitle>Sicherheit</booktitle>
<crossref>conf/sicherheit/2008</crossref>
<url>db/conf/sicherheit/sicherheit2008.html#IkinciHF08</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/21494</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/sicherheit/BecherF08" mdate="2023-07-04">
<author pid="68/1453">Michael Becher</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Towards Dynamic Malware Analysis to Increase Mobile Device Security423.</title>
<pages>423-433</pages>
<year>2008</year>
<booktitle>Sicherheit</booktitle>
<crossref>conf/sicherheit/2008</crossref>
<url>db/conf/sicherheit/sicherheit2008.html#BecherF08</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/21495</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/sicherheit/FreilingL08" mdate="2023-07-04">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="35/1968">Jens Liebchen</author>
<title>Iterative Kompromittierungsgraphverfeinerung als methodische Grundlage f&#252;r Netzwerkpenetrationstests.</title>
<pages>435-447</pages>
<year>2008</year>
<booktitle>Sicherheit</booktitle>
<crossref>conf/sicherheit/2008</crossref>
<url>db/conf/sicherheit/sicherheit2008.html#FreilingL08</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/21496</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/wdag/FreilingLM08" mdate="2017-05-19">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="53/5762">Christian Lambertz</author>
<author pid="70/3602">Mila E. Majster-Cederbaum</author>
<title>Easy Consensus Algorithms for the Crash-Recovery Model.</title>
<pages>507-508</pages>
<year>2008</year>
<booktitle>DISC</booktitle>
<ee>https://doi.org/10.1007/978-3-540-87779-0_39</ee>
<crossref>conf/wdag/2008</crossref>
<url>db/conf/wdag/disc2008.html#FreilingLM08</url>
</inproceedings>
</r>
<r><proceedings key="conf/dagstuhl/2005dm" mdate="2019-05-14">
<editor pid="56/5802">Irene Eusgeld</editor>
<editor pid="f/FCFreiling">Felix C. Freiling</editor>
<editor pid="r/RalfReussner">Ralf H. Reussner</editor>
<title>Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30 - November 1, 2005]</title>
<volume>4909</volume>
<year>2008</year>
<isbn>978-3-540-68946-1</isbn>
<booktitle>Dependability Metrics</booktitle>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<publisher>Springer</publisher>
<ee>https://doi.org/10.1007/978-3-540-68947-8</ee>
<url>db/conf/dagstuhl/dm2005.html</url>
</proceedings>
</r>
<r><article key="journals/ieeesp/WillemsHF07" mdate="2020-03-15">
<author pid="85/3643">Carsten Willems</author>
<author orcid="0000-0002-2783-1264" pid="h/ThorstenHolz">Thorsten Holz</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Toward Automated Dynamic Malware Analysis Using CWSandbox.</title>
<pages>32-39</pages>
<year>2007</year>
<volume>5</volume>
<journal>IEEE Secur. Priv.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/MSP.2007.45</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/MSP.2007.45</ee>
<url>db/journals/ieeesp/ieeesp5.html#WillemsHF07</url>
</article>
</r>
<r><inproceedings key="conf/europar/FreilingMM07" mdate="2017-05-24">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="99/2376">Matthias Majuntke</author>
<author pid="11/5490">Neeraj Mittal</author>
<title>On Detecting Termination in the Crash-Recovery Model.</title>
<pages>629-638</pages>
<year>2007</year>
<crossref>conf/europar/2007</crossref>
<booktitle>Euro-Par</booktitle>
<ee>https://doi.org/10.1007/978-3-540-74466-5_66</ee>
<url>db/conf/europar/europar2007.html#FreilingMM07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/imf/FreilingS07" mdate="2023-07-04">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="95/2797">Bastian Schwittay</author>
<title>A Common Process Model for Incident Response and Computer Forensics.</title>
<pages>19-39</pages>
<year>2007</year>
<booktitle>IMF</booktitle>
<crossref>conf/imf/2007</crossref>
<url>db/conf/imf/imf2007.html#FreilingS07</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/22383</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings114/article1867.html</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/imf/DaiyaDF07" mdate="2023-07-04">
<author pid="57/4900">Harish Daiya</author>
<author pid="d/MDornseif">Maximillian Dornseif</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Testing Forensic Hash Tools on Sparse Files.</title>
<pages>113-123</pages>
<year>2007</year>
<booktitle>IMF</booktitle>
<crossref>conf/imf/2007</crossref>
<url>db/conf/imf/imf2007.html#DaiyaDF07</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/22389</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings114/article1873.html</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/imf/FreilingS07a" mdate="2023-07-04">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="95/2797">Bastian Schwittay</author>
<title>Towards Reliable Rootkit Detection in Live Response.</title>
<pages>125-143</pages>
<year>2007</year>
<booktitle>IMF</booktitle>
<crossref>conf/imf/2007</crossref>
<url>db/conf/imf/imf2007.html#FreilingS07a</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/22380</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings114/article1874.html</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/mdm/BenensonFC07" mdate="2023-03-23">
<author pid="b/ZBenenson">Zinaida Benenson</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="07/755">Peter M. Cholewinski</author>
<title>Advanced Evasive Data Storage in Sensor Networks.</title>
<pages>146-151</pages>
<year>2007</year>
<crossref>conf/mdm/2007</crossref>
<booktitle>MDM</booktitle>
<ee>https://doi.org/10.1109/MDM.2007.29</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/MDM.2007.29</ee>
<url>db/conf/mdm/mdm2007.html#BenensonFC07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sss/CortinasFGLLPA07" mdate="2021-10-14">
<author orcid="0000-0003-1455-1703" pid="67/827">Roberto Corti&#241;as</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="43/1807">Marjan Ghajar-Azadanlou</author>
<author pid="29/3916">Alberto Lafuente</author>
<author orcid="0000-0003-4711-7110" pid="l/MikelLarrea">Mikel Larrea</author>
<author pid="p/LuciaDPenso">Lucia Draque Penso</author>
<author orcid="0000-0002-0901-4172" pid="97/6338">Iratxe Soraluze Arriola</author>
<title>Secure Failure Detection in TrustedPals.</title>
<pages>173-188</pages>
<year>2007</year>
<crossref>conf/sss/2007</crossref>
<booktitle>SSS</booktitle>
<ee>https://doi.org/10.1007/978-3-540-76627-8_15</ee>
<url>db/conf/sss/sss2007.html#CortinasFGLLPA07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sss/FreilingJ07" mdate="2017-05-25">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="45/4421">Arshad Jhumka</author>
<title>Global Predicate Detection in Distributed Systems with Small Faults.</title>
<pages>296-310</pages>
<year>2007</year>
<crossref>conf/sss/2007</crossref>
<booktitle>SSS</booktitle>
<ee>https://doi.org/10.1007/978-3-540-76627-8_23</ee>
<url>db/conf/sss/sss2007.html#FreilingJ07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wdag/Delporte-GalletFFPT07" mdate="2017-05-19">
<author pid="d/CDelporteGallet">Carole Delporte-Gallet</author>
<author pid="12/7013">Hugues Fauconnier</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="p/LuciaDPenso">Lucia Draque Penso</author>
<author pid="18/992">Andreas Tielmann</author>
<title>From Crash-Stop to Permanent Omission: Automatic Transformation and Weakest Failure Detectors.</title>
<pages>165-178</pages>
<year>2007</year>
<crossref>conf/wdag/2007</crossref>
<booktitle>DISC</booktitle>
<ee>https://doi.org/10.1007/978-3-540-75142-7_15</ee>
<url>db/conf/wdag/disc2007.html#Delporte-GalletFFPT07</url>
</inproceedings>
</r>
<r><proceedings key="conf/dagstuhl/2006P6371" mdate="2021-06-10">
<editor pid="c/ChristianCachin">Christian Cachin</editor>
<editor pid="f/FCFreiling">Felix C. Freiling</editor>
<editor pid="h/JaapHenkHoepman">Jaap-Henk Hoepman</editor>
<title>From Security to Dependability, 10.09. - 15.09.2006</title>
<booktitle>From Security to Dependability</booktitle>
<volume>06371</volume>
<year>2007</year>
<publisher>Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany</publisher>
<url>db/conf/dagstuhl/P6371.html</url>
<ee type="oa">http://drops.dagstuhl.de/portals/06371/</ee>
<series href="db/series/dagstuhl/index.html">Dagstuhl Seminar Proceedings</series>
</proceedings>
</r>
<r><article key="journals/dud/ReimerDVFSRL06" mdate="2021-10-14">
<author pid="17/1757">Helmut Reimer</author>
<author pid="d/JDittmann">Jana Dittmann</author>
<author pid="v/CVielhauer">Claus Vielhauer</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="03/6880">Francesca Saglietti</author>
<author pid="80/1305">Manfred Reitenspie&#223;</author>
<author pid="88/5471-1">Andreas Lang 0001</author>
<title>Veranstaltungsbesprechungen.</title>
<pages>258-259</pages>
<year>2006</year>
<volume>30</volume>
<journal>Datenschutz und Datensicherheit</journal>
<number>4</number>
<ee>https://doi.org/10.1007/s11623-006-0072-y</ee>
<url>db/journals/dud/dud30.html#ReimerDVFSRL06</url>
</article>
</r>
<r><article key="journals/ijsn/JhumkaFFS06" mdate="2020-10-26">
<author pid="45/4421">Arshad Jhumka</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="f/ChristofFetzer">Christof Fetzer</author>
<author orcid="0000-0003-1688-1167" pid="s/NeerajSuri">Neeraj Suri</author>
<title>An approach to synthesise safe systems.</title>
<pages>62-74</pages>
<year>2006</year>
<volume>1</volume>
<journal>Int. J. Secur. Networks</journal>
<number>1/2</number>
<ee>https://doi.org/10.1504/IJSN.2006.010824</ee>
<url>db/journals/ijsn/ijsn1.html#JhumkaFFS06</url>
</article>
</r>
<r><article key="journals/sigops/FreilingV06" mdate="2025-09-06">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author orcid="0000-0003-3547-3847" pid="10/3990">Hagen V&#246;lzer</author>
<title>Illustrating the impossibility of crash-tolerant consensus in asynchronous systems.</title>
<pages>105-109</pages>
<year>2006</year>
<volume>40</volume>
<journal>ACM SIGOPS Oper. Syst. Rev.</journal>
<number>2</number>
<ee>https://doi.org/10.1145/1131322.1131324</ee>
<url>db/journals/sigops/sigops40.html#FreilingV06</url>
</article>
</r>
<r><inproceedings key="conf/arcs/BenesonFHKP06" mdate="2023-07-04">
<author pid="b/ZBenenson">Zinaida Benenson</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="h/ThorstenHolz">Thorsten Holz</author>
<author pid="21/1324">Dogan Kesdogan</author>
<author pid="p/LuciaDPenso">Lucia Draque Penso</author>
<title>Safety, Liveness, and Information Flow: Dependability Revisited.</title>
<pages>56-65</pages>
<year>2006</year>
<crossref>conf/arcs/2006w</crossref>
<booktitle>ARCS Workshops</booktitle>
<url>db/conf/arcs/arcsw2006.html#BenesonFHKP06</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/29437</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings81/article4349.html</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/esas/BenensonFPRW06" mdate="2024-05-07">
<author pid="b/ZBenenson">Zinaida Benenson</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="18/1549">Christian Rohner</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks.</title>
<pages>165-178</pages>
<year>2006</year>
<crossref>conf/esas/2006</crossref>
<booktitle>ESAS</booktitle>
<ee>https://doi.org/10.1007/11964254_15</ee>
<url>db/conf/esas/esas2006.html#BenensonFPRW06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/FortFPBK06" mdate="2019-08-20">
<author pid="31/6728">Milan Fort</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="p/LuciaDPenso">Lucia Draque Penso</author>
<author pid="b/ZBenenson">Zinaida Benenson</author>
<author pid="21/1324">Dogan Kesdogan</author>
<title>TrustedPals: Secure Multiparty Computation Implemented with Smart Cards.</title>
<pages>34-48</pages>
<year>2006</year>
<crossref>conf/esorics/2006</crossref>
<booktitle>ESORICS</booktitle>
<ee type="oa">https://doi.org/10.1007/11863908_3</ee>
<url>db/conf/esorics/esorics2006.html#FortFPBK06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/imf/AndersonDFHILM06" mdate="2023-07-04">
<author pid="66/6659-2">Philip Anderson 0002</author>
<author pid="d/MDornseif">Maximillian Dornseif</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="h/ThorstenHolz">Thorsten Holz</author>
<author pid="47/3067">Alastair Irons</author>
<author pid="84/5588">Christopher Laing</author>
<author pid="55/901">Martin Mink</author>
<title>A Comparative Study of Teaching Forensics at a University Degree Level.</title>
<pages>116-127</pages>
<year>2006</year>
<crossref>conf/imf/2006</crossref>
<booktitle>IMF</booktitle>
<url>db/conf/imf/imf2006.html#AndersonDFHILM06</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/23454</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings97/article4931.html</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/infoseccd/MinkF06" mdate="2018-11-06">
<author pid="55/901">Martin Mink</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Is attack better than defense?: teaching information security the right way.</title>
<pages>44-48</pages>
<year>2006</year>
<booktitle>InfoSecCD</booktitle>
<ee>https://doi.org/10.1145/1231047.1231056</ee>
<crossref>conf/infoseccd/2006</crossref>
<url>db/conf/infoseccd/infoseccd2006.html#MinkF06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/opodis/MittalPF06" mdate="2017-05-17">
<author pid="11/5490">Neeraj Mittal</author>
<author pid="02/732">Kuppahalli L. Phaneesh</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Safe Termination Detection in an Asynchronous Distributed System When Processes May Crash and Recover.</title>
<pages>126-141</pages>
<year>2006</year>
<crossref>conf/opodis/2006</crossref>
<booktitle>OPODIS</booktitle>
<ee>https://doi.org/10.1007/11945529_10</ee>
<url>db/conf/opodis/opodis2006.html#MittalPF06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/percom/BenensonPFL06" mdate="2023-03-24">
<author pid="b/ZBenenson">Zinaida Benenson</author>
<author pid="51/730">Lexi Pimenidis</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="l/SLucks">Stefan Lucks</author>
<title>Authenticated Query Flooding in Sensor Networks.</title>
<pages>644-647</pages>
<year>2006</year>
<crossref>conf/percom/2006w</crossref>
<booktitle>PerCom Workshops</booktitle>
<ee>https://doi.org/10.1109/PERCOMW.2006.23</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/PERCOMW.2006.23</ee>
<url>db/conf/percom/percomw2006.html#BenensonPFL06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/raid/BaecherKHDF06" mdate="2019-09-25">
<author pid="15/1510">Paul Baecher</author>
<author pid="37/6245">Markus Koetter</author>
<author orcid="0000-0002-2783-1264" pid="h/ThorstenHolz">Thorsten Holz</author>
<author pid="d/MDornseif">Maximillian Dornseif</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>The Nepenthes Platform: An Efficient Approach to Collect Malware.</title>
<pages>165-184</pages>
<year>2006</year>
<crossref>conf/raid/2006</crossref>
<booktitle>RAID</booktitle>
<ee>https://doi.org/10.1007/11856214_9</ee>
<url>db/conf/raid/raid2006.html#BaecherKHDF06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sec/BenensonFHLP06" mdate="2018-06-26">
<author pid="b/ZBenenson">Zinaida Benenson</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="32/405">Ernest Hammerschmidt</author>
<author pid="l/SLucks">Stefan Lucks</author>
<author pid="51/730">Lexi Pimenidis</author>
<title>Authenticated Query Flooding in Sensor Networks.</title>
<pages>38-49</pages>
<year>2006</year>
<crossref>conf/sec/2006</crossref>
<booktitle>SEC</booktitle>
<ee type="oa">https://doi.org/10.1007/0-387-33406-8_4</ee>
<url>db/conf/sec/sec2006.html#BenensonFHLP06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sicherheit/EsserF06" mdate="2023-07-04">
<author pid="79/814">Hans-Georg E&#223;er</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Kapazit&#228;tsmessung eines verdeckten Zeitkanals &#252;ber HTTP.</title>
<pages>115-118</pages>
<year>2006</year>
<crossref>conf/sicherheit/2006</crossref>
<booktitle>Sicherheit</booktitle>
<url>db/conf/sicherheit/sicherheit2006.html#EsserF06</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/24763</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings77/article4501.html</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/srds/WarnsFH06" mdate="2024-08-04">
<author pid="85/3073">Timo Warns</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author orcid="0000-0001-6625-4335" pid="h/WilhelmHasselbring">Wilhelm Hasselbring</author>
<title>Solving Consensus Using Structural Failure Models.</title>
<pages>212-224</pages>
<year>2006</year>
<crossref>conf/srds/2006</crossref>
<booktitle>SRDS</booktitle>
<ee>https://doi.org/10.1109/SRDS.2006.44</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SRDS.2006.44</ee>
<url>db/conf/srds/srds2006.html#WarnsFH06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sss/FreilingMM06" mdate="2017-05-25">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="99/2376">Matthias Majuntke</author>
<author pid="11/5490">Neeraj Mittal</author>
<title>Brief Announcement: Termination Detection in an Asynchronous Distributed System with Crash-Recovery Failures.</title>
<pages>572-573</pages>
<year>2006</year>
<crossref>conf/sss/2006</crossref>
<booktitle>SSS</booktitle>
<ee>https://doi.org/10.1007/978-3-540-49823-0_43</ee>
<url>db/conf/sss/sss2006.html#FreilingMM06</url>
</inproceedings>
</r>
<r><inproceedings publtype="informal" key="conf/dagstuhl/CachinFH06" mdate="2018-08-23">
<author pid="c/ChristianCachin">Christian Cachin</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="h/JaapHenkHoepman">Jaap-Henk Hoepman</author>
<title>06371 Executive Summary -- From Security to Dependability.</title>
<year>2006</year>
<booktitle>From Security to Dependability</booktitle>
<ee type="oa">http://drops.dagstuhl.de/opus/volltexte/2007/851</ee>
<crossref>conf/dagstuhl/2006P6371</crossref>
<url>db/conf/dagstuhl/P6371.html#CachinFH06</url>
</inproceedings>
</r>
<r><inproceedings publtype="informal" key="conf/dagstuhl/CachinFH06a" mdate="2018-08-23">
<author pid="c/ChristianCachin">Christian Cachin</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="h/JaapHenkHoepman">Jaap-Henk Hoepman</author>
<title>06371 Abstracts Collection -- From Security to Dependability.</title>
<year>2006</year>
<booktitle>From Security to Dependability</booktitle>
<ee type="oa">http://drops.dagstuhl.de/opus/volltexte/2007/853</ee>
<crossref>conf/dagstuhl/2006P6371</crossref>
<url>db/conf/dagstuhl/P6371.html#CachinFH06a</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dagstuhl/EusgeldF05" mdate="2017-05-19">
<author pid="56/5802">Irene Eusgeld</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Introduction to Dependability Metrics.</title>
<pages>1-4</pages>
<year>2005</year>
<booktitle>Dependability Metrics</booktitle>
<ee>https://doi.org/10.1007/978-3-540-68947-8_1</ee>
<crossref>conf/dagstuhl/2005dm</crossref>
<url>db/conf/dagstuhl/dm2005.html#EusgeldF05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dagstuhl/BohmeF05" mdate="2017-05-19">
<author pid="52/6295">Rainer B&#246;hme</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>On Metrics and Measurements.</title>
<pages>7-13</pages>
<year>2005</year>
<booktitle>Dependability Metrics</booktitle>
<ee>https://doi.org/10.1007/978-3-540-68947-8_2</ee>
<crossref>conf/dagstuhl/2005dm</crossref>
<url>db/conf/dagstuhl/dm2005.html#BohmeF05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dagstuhl/Freiling05" mdate="2017-05-19">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Introduction to Security Metrics.</title>
<pages>129-132</pages>
<year>2005</year>
<booktitle>Dependability Metrics</booktitle>
<ee>https://doi.org/10.1007/978-3-540-68947-8_11</ee>
<crossref>conf/dagstuhl/2005dm</crossref>
<url>db/conf/dagstuhl/dm2005.html#Freiling05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dagstuhl/FreilingW05" mdate="2017-05-19">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="62/5262">Max Walter</author>
<title>Reliability vs. Security: A Subjective Overview.</title>
<pages>255-257</pages>
<year>2005</year>
<booktitle>Dependability Metrics</booktitle>
<ee>https://doi.org/10.1007/978-3-540-68947-8_25</ee>
<crossref>conf/dagstuhl/2005dm</crossref>
<url>db/conf/dagstuhl/dm2005.html#FreilingW05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/edcc/AvoineGGV05" mdate="2017-05-26">
<author pid="a/GildasAvoine">Gildas Avoine</author>
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<author pid="g/RachidGuerraoui">Rachid Guerraoui</author>
<author pid="57/6250">Marko Vukolic</author>
<title>Gracefully Degrading Fair Exchange with Security Modules.</title>
<pages>55-71</pages>
<ee>https://doi.org/10.1007/11408901_5</ee>
<year>2005</year>
<crossref>conf/edcc/2005</crossref>
<booktitle>EDCC</booktitle>
<url>db/conf/edcc/edcc2005.html#AvoineGGV05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/FreilingHW05" mdate="2023-03-21">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author orcid="0000-0002-2783-1264" pid="h/ThorstenHolz">Thorsten Holz</author>
<author pid="15/4600">Georg Wicherski</author>
<title>Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks.</title>
<pages>319-335</pages>
<year>2005</year>
<crossref>conf/esorics/2005</crossref>
<booktitle>ESORICS</booktitle>
<ee type="oa">https://doi.org/10.1007/11555827_19</ee>
<url>db/conf/esorics/esorics2005.html#FreilingHW05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/europar/ShapiroKFR05" mdate="2017-11-03">
<author pid="s/MarcShapiro">Marc Shapiro 0001</author>
<author pid="k/IditKeidar">Idit Keidar</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="r/LRodrigues">Lu&#237;s E. T. Rodrigues</author>
<title>Topic 8 - Distributed Systems and Algorithms.</title>
<pages>593</pages>
<year>2005</year>
<crossref>conf/europar/2005</crossref>
<booktitle>Euro-Par</booktitle>
<ee>https://doi.org/10.1007/11549468_66</ee>
<url>db/conf/europar/europar2005.html#ShapiroKFR05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ewsn/BenensonGK05" mdate="2021-03-01">
<author pid="b/ZBenenson">Zinaida Benenson</author>
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<author pid="21/1324">Dogan Kesdogan</author>
<title>An algorithmic framework for robust access control in wireless sensor networks.</title>
<pages>158-165</pages>
<year>2005</year>
<booktitle>EWSN</booktitle>
<ee>https://doi.org/10.1109/EWSN.2005.1462007</ee>
<crossref>conf/ewsn/2005</crossref>
<url>db/conf/ewsn/ewsn2005.html#BenensonGK05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/gi/FreilingMP05" mdate="2023-07-04">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="11/5490">Neeraj Mittal</author>
<author pid="p/LuciaDPenso">Lucia Draque Penso</author>
<title>Transformations in Secure and Fault-Tolerant Distributed Computation.</title>
<pages>410-412</pages>
<year>2005</year>
<crossref>conf/gi/2005-1</crossref>
<booktitle>GI Jahrestagung (1)</booktitle>
<url>db/conf/gi/gi2005-1.html#FreilingMP05</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/28071</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings67/article4140.html</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/ictac/Delporte-GalletFF05" mdate="2017-05-23">
<author pid="d/CDelporteGallet">Carole Delporte-Gallet</author>
<author pid="12/7013">Hugues Fauconnier</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Revisiting Failure Detection and Consensus in Omission Failure Environments.</title>
<pages>394-408</pages>
<year>2005</year>
<crossref>conf/ictac/2005</crossref>
<booktitle>ICTAC</booktitle>
<ee>https://doi.org/10.1007/11560647_26</ee>
<url>db/conf/ictac/ictac2005.html#Delporte-GalletFF05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/opodis/FreilingHP05" mdate="2017-05-17">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="h/MauriceHerlihy">Maurice Herlihy</author>
<author pid="p/LuciaDPenso">Lucia Draque Penso</author>
<title>Optimal Randomized Fair Exchange with Secret Shared Coins.</title>
<pages>61-72</pages>
<year>2005</year>
<crossref>conf/opodis/2005</crossref>
<booktitle>OPODIS</booktitle>
<ee>https://doi.org/10.1007/11795490_7</ee>
<url>db/conf/opodis/opodis2005.html#FreilingHP05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pdcs/BenensonCF05" mdate="2006-09-26">
<author pid="b/ZBenenson">Zinaida Benenson</author>
<author pid="07/755">Peter M. Cholewinski</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Simple Evasive Data Storage in Sensor Networks.</title>
<pages>779-784</pages>
<year>2005</year>
<crossref>conf/pdcs/2005</crossref>
<booktitle>IASTED PDCS</booktitle>
<url>db/conf/pdcs/pdcs2005.html#BenensonCF05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sicherheit/BenensonGK05" mdate="2023-07-04">
<author pid="b/ZBenenson">Zinaida Benenson</author>
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<author pid="21/1324">Dogan Kesdogan</author>
<title>Secure Multi-Party Computation with Security Modules.</title>
<pages>41-52</pages>
<year>2005</year>
<crossref>conf/sicherheit/2005</crossref>
<booktitle>Sicherheit</booktitle>
<url>db/conf/sicherheit/sicherheit2005.html#BenensonGK05</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/28394</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings62/article3562.html</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/sss/FreilingG05" mdate="2017-05-25">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="42/6508">Sukumar Ghosh</author>
<title>Code Stabilization.</title>
<pages>128-139</pages>
<year>2005</year>
<crossref>conf/sss/2005</crossref>
<booktitle>Self-Stabilizing Systems</booktitle>
<ee>https://doi.org/10.1007/11577327_9</ee>
<url>db/conf/sss/sss2005.html#FreilingG05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wdag/MittalFVP05" mdate="2017-05-19">
<author pid="11/5490">Neeraj Mittal</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="43/5587-1">Subbarayan Venkatesan</author>
<author pid="p/LuciaDPenso">Lucia Draque Penso</author>
<title>Efficient Reduction for Wait-Free Termination Detection in a Crash-Prone Distributed System.</title>
<pages>93-107</pages>
<year>2005</year>
<crossref>conf/wdag/2005</crossref>
<booktitle>DISC</booktitle>
<ee>https://doi.org/10.1007/11561927_9</ee>
<url>db/conf/wdag/disc2005.html#MittalFVP05</url>
</inproceedings>
</r>
<r><article key="journals/pik/DornseifGH04" mdate="2021-04-29">
<author pid="d/MDornseif">Maximillian Dornseif</author>
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<author orcid="0000-0002-2783-1264" pid="h/ThorstenHolz">Thorsten Holz</author>
<title>Vulnerability Assessment using Honeypots.</title>
<pages>195-201</pages>
<year>2004</year>
<volume>27</volume>
<journal>Prax. Inf.verarb. Kommun.</journal>
<number>4</number>
<ee>https://doi.org/10.1515/PIKO.2004.195</ee>
<url>db/journals/pik/pik27.html#DornseifGH04</url>
</article>
</r>
<r><inproceedings key="conf/dagstuhl/BunseFL04" mdate="2017-05-19">
<author pid="12/6986">Christian Bunse</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="18/6032">Nicole L&#233;vy</author>
<title>A Taxonomy on Component-Based Software Engineering Methods.</title>
<pages>103-119</pages>
<year>2004</year>
<crossref>conf/dagstuhl/2004trust</crossref>
<booktitle>Architecting Systems with Trustworthy Components</booktitle>
<ee>https://doi.org/10.1007/11786160_6</ee>
<url>db/conf/dagstuhl/trust2004.html#BunseFL04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dagstuhl/FreilingS04" mdate="2017-05-19">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="79/4203">Thomas Santen</author>
<title>On the Composition of Compositional Reasoning.</title>
<pages>137-151</pages>
<year>2004</year>
<crossref>conf/dagstuhl/2004trust</crossref>
<booktitle>Architecting Systems with Trustworthy Components</booktitle>
<ee>https://doi.org/10.1007/11786160_8</ee>
<url>db/conf/dagstuhl/trust2004.html#FreilingS04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dimva/DornseifGH04" mdate="2023-07-04">
<author pid="d/MDornseif">Maximillian Dornseif</author>
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<author pid="h/ThorstenHolz">Thorsten Holz</author>
<title>Ermittlung von Verwundbarkeiten mit elektronischen K&#246;dern.</title>
<pages>129-141</pages>
<year>2004</year>
<crossref>conf/dimva/2004</crossref>
<booktitle>DIMVA</booktitle>
<url>db/conf/dimva/dimva2004.html#DornseifGH04</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/29211</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings46/article2968.html</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/formats/GartnerJ04" mdate="2017-05-26">
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<author pid="45/4421">Arshad Jhumka</author>
<title>Automating the Addition of Fail-Safe Fault-Tolerance: Beyond Fusion-Closed Specifications.</title>
<pages>183-198</pages>
<ee>https://doi.org/10.1007/978-3-540-30206-3_14</ee>
<year>2004</year>
<crossref>conf/formats/2004</crossref>
<booktitle>FORMATS/FTRTFT</booktitle>
<url>db/conf/formats/formats2004.html#GartnerJ04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/gi/BenensonGK04" mdate="2023-07-04">
<author pid="b/ZBenenson">Zinaida Benenson</author>
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<author pid="21/1324">Dogan Kesdogan</author>
<title>User Authentication in Sensor Networks.</title>
<pages>385-389</pages>
<year>2004</year>
<crossref>conf/gi/2004-2</crossref>
<booktitle>GI Jahrestagung (2)</booktitle>
<url>db/conf/gi/gi2004-2.html#BenensonGK04</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/28800</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings51/article3281.html</ee>
</inproceedings>
</r>
<r><incollection key="books/sp/webDyn2004/BuchmannBCFGLMM04" mdate="2005-01-03">
<author pid="b/APBuchmann">Alejandro P. Buchmann</author>
<author pid="34/1731">Christof Bornh&#246;vd</author>
<author pid="c/MarianoCilia">Mariano Cilia</author>
<author pid="73/1084">Ludger Fiege</author>
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<author pid="12/2156">Christoph Liebig</author>
<author pid="13/953">Matthias Meixner</author>
<author pid="17/6562">Gero M&#252;hl</author>
<title>DREAM: Distributed Reliable Event-Based Application Management.</title>
<pages>319-352</pages>
<year>2004</year>
<crossref>books/sp/webDyn04</crossref>
<booktitle>Web Dynamics</booktitle>
<url>db/books/collections/webDyn2004.html#BuchmannBCFGLMM04</url>
</incollection>
</r>
<r><article publtype="informal" key="journals/corr/cs-CR-0406059" mdate="2020-01-10">
<author pid="d/MDornseif">Maximillian Dornseif</author>
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<author pid="h/ThorstenHolz">Thorsten Holz</author>
<title>Ermittlung von Verwundbarkeiten mit elektronischen Koedern</title>
<ee type="oa">http://arxiv.org/abs/cs/0406059</ee>
<year>2004</year>
<journal>CoRR</journal>
<volume>cs.CR/0406059</volume>
<url>db/journals/corr/corr0406.html#cs-CR-0406059</url>
</article>
</r>
<r><article key="journals/cj/PagniaVG03" mdate="2017-05-20">
<author pid="48/6548">Henning Pagnia</author>
<author pid="07/3277">Holger Vogt</author>
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<title>Fair Exchange.</title>
<pages>55-75</pages>
<year>2003</year>
<volume>46</volume>
<journal>Comput. J.</journal>
<number>1</number>
<ee>https://doi.org/10.1093/comjnl/46.1.55</ee>
<url>db/journals/cj/cj46.html#PagniaVG03</url>
</article>
</r>
<r><article key="journals/dsonline/GartnerBK03" mdate="2020-08-25">
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<author pid="84/3267">Levente Butty&#225;n</author>
<author pid="28/3604">Klaus Kursawe</author>
<title>Dependable Systems: Podsy Workshop Report - From Fault Tolerance to Security and Back.</title>
<year>2003</year>
<volume>4</volume>
<journal>IEEE Distributed Syst. Online</journal>
<number>9</number>
<url>db/journals/dsonline/dsonline4.html#GartnerBK03</url>
</article>
</r>
<r><article key="journals/it/Gartner03" mdate="2023-08-28">
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<title>Beobachten des Internet: Traum und Wirklichkeit (How to observe the Internet).</title>
<year>2003</year>
<volume>45</volume>
<journal>it Inf. Technol.</journal>
<number>6</number>
<ee>https://doi.org/10.1524/itit.45.6.353.20504</ee>
<ee>https://www.wikidata.org/entity/Q115722151</ee>
<url>db/journals/it/it45.html#Gartner03</url>
<pages>353-355</pages>
</article>
</r>
<r><article key="journals/monet/VogtGP03" mdate="2020-09-24">
<author pid="07/3277">Holger Vogt</author>
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<author pid="48/6548">Henning Pagnia</author>
<title>Supporting Fair Exchange in Mobile Environments.</title>
<pages>127-136</pages>
<year>2003</year>
<volume>8</volume>
<journal>Mob. Networks Appl.</journal>
<number>2</number>
<url>db/journals/monet/monet8.html#VogtGP03</url>
</article>
</r>
<r><inproceedings key="conf/dsn/GartnerKB03" mdate="2023-03-24">
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<author pid="28/3604">Klaus Kursawe</author>
<author pid="84/3267">Levente Butty&#225;n</author>
<title>PoDSy 2003: Principles of Dependable Systems.</title>
<pages>763</pages>
<year>2003</year>
<crossref>conf/dsn/2003</crossref>
<booktitle>DSN</booktitle>
<ee>https://doi.ieeecomputersociety.org/10.1109/DSN.2003.10002</ee>
<url>db/conf/dsn/dsn2003.html#GartnerKB03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/gi/Gartner03" mdate="2023-07-04">
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<title>Byzantine Failures and Security: Arbitrary is not (always) Random.</title>
<pages>127-138</pages>
<year>2003</year>
<crossref>conf/gi/2003-s</crossref>
<booktitle>GI Jahrestagung (Schwerpunkt &#34;Sicherheit - Schutz und Zuverl&#228;ssigkeit&#34;)</booktitle>
<url>db/conf/gi/gi2003-s.html#Gartner03</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/29565</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings36/article1040.html</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/middleware/FiegeZGH03" mdate="2003-07-17">
<author pid="73/1084">Ludger Fiege</author>
<author pid="26/5583">Andreas Zeidler</author>
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<author pid="25/3100">Sidath B. Handurukande</author>
<title>Dealing with Uncertainty in Mobile Publish/Subscribe Middleware.</title>
<pages>60-67</pages>
<year>2003</year>
<crossref>conf/middleware/2003w</crossref>
<booktitle>Middleware Workshops</booktitle>
<url>db/conf/middleware/middlewarew2003.html#FiegeZGH03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/middleware/FiegeGKZ03" mdate="2017-05-25">
<author pid="73/1084">Ludger Fiege</author>
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<author pid="84/1731">Oliver Kasten</author>
<author pid="26/5583">Andreas Zeidler</author>
<title>Supporting Mobility in Content-Based Publish/Subscribe Middleware.</title>
<pages>103-122</pages>
<ee>https://doi.org/10.1007/3-540-44892-6_6</ee>
<year>2003</year>
<crossref>conf/middleware/2003</crossref>
<booktitle>Middleware</booktitle>
<url>db/conf/middleware/middleware2003.html#FiegeGKZ03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spc/BohnGV03" mdate="2019-03-27">
<author pid="56/5161-1">J&#252;rgen Bohn 0001</author>
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<author pid="01/1773">Harald Vogt</author>
<title>Dependability Issues of Pervasive Computing in a Healthcare Environment.</title>
<pages>53-70</pages>
<ee>https://doi.org/10.1007/978-3-540-39881-3_8</ee>
<year>2003</year>
<crossref>conf/spc/2003</crossref>
<booktitle>SPC</booktitle>
<url>db/conf/spc/spc2003.html#BohnGV03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sss/GartnerP03" mdate="2017-05-25">
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<author pid="48/6548">Henning Pagnia</author>
<title>Time-Efficient Self-Stabilizing Algorithms through Hierarchical Structures.</title>
<pages>154-168</pages>
<year>2003</year>
<crossref>conf/sss/2003</crossref>
<booktitle>Self-Stabilizing Systems</booktitle>
<ee>https://doi.org/10.1007/3-540-45032-7_12</ee>
<url>db/conf/sss/sss2003.html#GartnerP03</url>
</inproceedings>
</r>
<r><article key="journals/ker/FiegeMG02" mdate="2020-08-27">
<author pid="73/1084">Ludger Fiege</author>
<author pid="17/6562">Gero M&#252;hl</author>
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<title>Modular event-based systems.</title>
<pages>359-388</pages>
<year>2002</year>
<volume>17</volume>
<journal>Knowl. Eng. Rev.</journal>
<number>4</number>
<ee>https://doi.org/10.1017/S0269888903000559</ee>
<url>db/journals/ker/ker17.html#FiegeMG02</url>
</article>
</r>
<r><inproceedings key="conf/fasec/Gartner02" mdate="2017-05-19">
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<title>Revisiting Liveness Properties in the Context of Secure Systems.</title>
<pages>221-238</pages>
<ee>https://doi.org/10.1007/978-3-540-40981-6_18</ee>
<year>2002</year>
<crossref>conf/fasec/2002</crossref>
<booktitle>FASec</booktitle>
<url>db/conf/fasec/fasec2002.html#Gartner02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mascots/MuhlFGB02" mdate="2023-03-23">
<author pid="17/6562">Gero M&#252;hl</author>
<author pid="73/1084">Ludger Fiege</author>
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<author pid="b/APBuchmann">Alejandro P. Buchmann</author>
<title>Evaluating Advanced Routing Algorithms for Content-Based Publish/Subscribe Systems.</title>
<pages>167-176</pages>
<year>2002</year>
<crossref>conf/mascots/2002</crossref>
<booktitle>MASCOTS</booktitle>
<ee>https://doi.org/10.1109/MASCOT.2002.1167074</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/MASCOT.2002.1167074</ee>
<url>db/conf/mascots/mascots2002.html#MuhlFGB02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sac/FiegeMG02" mdate="2018-11-06">
<author pid="73/1084">Ludger Fiege</author>
<author pid="17/6562">Gero M&#252;hl</author>
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<title>A modular approach to build structured event-based systems.</title>
<pages>385-392</pages>
<year>2002</year>
<crossref>conf/sac/2002</crossref>
<booktitle>SAC</booktitle>
<ee>https://doi.org/10.1145/508791.508864</ee>
<url>db/conf/sac/sac2002.html#FiegeMG02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wdag/GartnerP02" mdate="2017-05-19">
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<author pid="23/1987">Stefan Pleisch</author>
<title>Failure Detection Sequencers: Necessary and Sufficient Information about Failures to Solve Predicate Detection.</title>
<pages>280-294</pages>
<year>2002</year>
<crossref>conf/wdag/2002</crossref>
<booktitle>DISC</booktitle>
<ee>https://doi.org/10.1007/3-540-36108-1_19</ee>
<url>db/conf/wdag/disc2002.html#GartnerP02</url>
</inproceedings>
</r>
<r><phdthesis key="phd/dnb/Freiling01" mdate="2021-07-17">
<author pid="f/FCFreiling">Felix C. Freiling</author>
<title>Formale Grundlagen der Fehlertoleranz in verteilten Systemen.</title>
<year>2001</year>
<pages>1-186</pages>
<school>Darmstadt University of Technology, Germany</school>
<ee type="oa">http://elib.tu-darmstadt.de/diss/000162/gaertner.pdf</ee>
<ee>https://nbn-resolving.org/urn:nbn:de:tuda-tuprints-1621</ee>
<ee>https://d-nb.info/96275479X</ee>
<ee>https://d-nb.info/96281802X</ee>
</phdthesis>
</r>
<r><inproceedings key="conf/welcom/VogtPG01" mdate="2017-05-23">
<author pid="07/3277">Holger Vogt</author>
<author pid="48/6548">Henning Pagnia</author>
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<title>Using Smart Cards for Fair Exchange.</title>
<pages>101-113</pages>
<year>2001</year>
<crossref>conf/welcom/2001</crossref>
<booktitle>WELCOM</booktitle>
<ee>https://doi.org/10.1007/3-540-45598-1_11</ee>
<url>db/conf/welcom/welcom2001.html#VogtPG01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wss/GartnerP01" mdate="2017-05-21">
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<author pid="23/1987">Stefan Pleisch</author>
<title>(Im)Possibilities of Predicate Detection in Crash-Affected Systems.</title>
<pages>98-113</pages>
<year>2001</year>
<crossref>conf/wss/2001</crossref>
<booktitle>WSS</booktitle>
<ee>https://doi.org/10.1007/3-540-45438-1_7</ee>
<url>db/conf/wss/wss2001.html#GartnerP01</url>
</inproceedings>
</r>
<r><incollection key="conf/gi/Gartner01" mdate="2023-07-04">
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<title>Formale Grundlagen der Fehlertoleranz in verteilten Systemen.</title>
<pages>39-49</pages>
<year>2001</year>
<booktitle>Ausgezeichnete Informatikdissertationen</booktitle>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/4445</ee>
<ee type="oa">https://subs.emis.de/LNI/Dissertation/Dissertation2/article114.html</ee>
<crossref>conf/gi/2001diss</crossref>
<url>db/conf/gi/diss2001.html#Gartner01</url>
</incollection>
</r>
<r><article key="journals/jetai/MantelG00" mdate="2017-05-18">
<author pid="m/HeikoMantel">Heiko Mantel</author>
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<title>A case study in the mechanical verification of fault tolerance.</title>
<pages>473-487</pages>
<year>2000</year>
<volume>12</volume>
<journal>J. Exp. Theor. Artif. Intell.</journal>
<number>4</number>
<url>db/journals/jetai/jetai12.html#MantelG00</url>
<ee>https://doi.org/10.1080/095281300454847</ee>
</article>
</r>
<r><inproceedings key="conf/flairs/MantelG00" mdate="2022-10-26">
<author pid="m/HeikoMantel">Heiko Mantel</author>
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<title>A Case Study in the Mechanical Verification of Fault Tolerance.</title>
<pages>341-345</pages>
<year>2000</year>
<crossref>conf/flairs/2000</crossref>
<booktitle>FLAIRS</booktitle>
<url>db/conf/flairs/flairs2000.html#MantelG00</url>
<ee type="oa">http://www.aaai.org/Library/FLAIRS/2000/flairs00-064.php</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/gi/TheisenG00" mdate="2018-03-02">
<author pid="63/3607">Marc Theisen</author>
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<title>Correctness Preserving Transformations for the Design of Parallelized Low-Power Systems.</title>
<pages>165-180</pages>
<year>2000</year>
<booktitle>GI Jahrestagung</booktitle>
<ee>https://doi.org/10.1007/978-3-642-58322-3_15</ee>
<crossref>conf/gi/2000</crossref>
<url>db/conf/gi/gi2000.html#TheisenG00</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ma/PagniaVGW00" mdate="2017-05-24">
<author pid="48/6548">Henning Pagnia</author>
<author pid="07/3277">Holger Vogt</author>
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<author pid="94/2003">Uwe G. Wilhelm</author>
<title>Solving Fair Exchange with Mobile Agents.</title>
<pages>57-72</pages>
<year>2000</year>
<crossref>conf/ma/2000</crossref>
<booktitle>ASA/MA</booktitle>
<url>db/conf/ma/ma2000.html#PagniaVGW00</url>
<ee>https://doi.org/10.1007/978-3-540-45347-5_6</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/srds/GartnerK00" mdate="2023-03-24">
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<author pid="29/1062">Sven Kloppenburg</author>
<title>Consistent Detection of Global Predicates under a Weak Fault Assumption.</title>
<pages>94-103</pages>
<year>2000</year>
<crossref>conf/srds/2000</crossref>
<booktitle>SRDS</booktitle>
<ee>https://doi.org/10.1109/RELDI.2000.885397</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/RELDI.2000.885397</ee>
<url>db/conf/srds/srds2000.html#GartnerK00</url>
</inproceedings>
</r>
<r><article key="journals/csur/Gartner99" mdate="2018-11-06">
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<title>Fundamentals of Fault-Tolerant Distributed Computing in Asynchronous Environments.</title>
<pages>1-26</pages>
<year>1999</year>
<volume>31</volume>
<journal>ACM Comput. Surv.</journal>
<number>1</number>
<ee>https://doi.org/10.1145/311531.311532</ee>
<url>db/journals/csur/csur31.html#Gartner99</url>
</article>
</r>
<r><article key="journals/jucs/Gartner99" mdate="2023-09-07">
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<title>Transformational Approaches to the Specification and Verification of Fault-Tolerant Systems: Formal Background and Classification.</title>
<pages>668-692</pages>
<year>1999</year>
<volume>5</volume>
<journal>J. Univers. Comput. Sci.</journal>
<number>10</number>
<url>db/journals/jucs/jucs5.html#Gartner99</url>
<ee type="oa">https://doi.org/10.3217/jucs-005-10-0668</ee>
</article>
</r>
<r><inproceedings key="conf/acsac/VogtPG99" mdate="2023-03-23">
<author pid="07/3277">Holger Vogt</author>
<author pid="48/6548">Henning Pagnia</author>
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<title>Modular Fair Exchange Protocols for Electronic Commerce.</title>
<pages>3-11</pages>
<year>1999</year>
<crossref>conf/acsac/1999</crossref>
<booktitle>ACSAC</booktitle>
<ee>https://doi.org/10.1109/CSAC.1999.816008</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSAC.1999.816008</ee>
<url>db/conf/acsac/acsac1999.html#VogtPG99</url>
</inproceedings>
</r>
<r><inproceedings key="conf/gi/GartnerT99" mdate="2017-05-23">
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<author pid="63/3607">Marc Theisen</author>
<title>Transformationen zur parallelisierten und fehlertoleranten Informationsverarbeitung.</title>
<pages>207-214</pages>
<year>1999</year>
<crossref>conf/gi/1999</crossref>
<booktitle>GI Jahrestagung</booktitle>
<url>db/conf/gi/gi99.html#GartnerT99</url>
<ee>https://doi.org/10.1007/978-3-662-01069-3_31</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/srds/GartnerPV99" mdate="2023-03-24">
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<author pid="48/6548">Henning Pagnia</author>
<author pid="07/3277">Holger Vogt</author>
<title>Approaching a Formal Definition of Fairness in Electronic Commerce.</title>
<pages>354-359</pages>
<year>1999</year>
<crossref>conf/srds/1999</crossref>
<booktitle>SRDS</booktitle>
<ee>https://doi.org/10.1109/RELDIS.1999.805123</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/RELDIS.1999.805123</ee>
<url>db/conf/srds/srds99.html#GartnerPV99</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wss/TheelG99" mdate="2002-12-30">
<author pid="t/OliverETheel">Oliver E. Theel</author>
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<title>An exercise in proving convergence through transfer functions.</title>
<pages>41-47</pages>
<year>1999</year>
<crossref>conf/wss/1999</crossref>
<booktitle>WSS</booktitle>
<url>db/conf/wss/wss1999.html#TheelG99</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wss/GartnerP99" mdate="2002-12-30">
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<author pid="48/6548">Henning Pagnia</author>
<title>Self-stabilizing load distribution for replicated servers on a per-access basis.</title>
<pages>102-109</pages>
<year>1999</year>
<crossref>conf/wss/1999</crossref>
<booktitle>WSS</booktitle>
<url>db/conf/wss/wss1999.html#GartnerP99</url>
</inproceedings>
</r>
<r><article key="journals/insk/Gartner98" mdate="2020-08-13">
<author pid="f/FCFreiling">Felix C. G&#228;rtner</author>
<title>Aller Jahre wieder ... Eine fiktive Leidensgeschichte.</title>
<pages>161</pages>
<year>1998</year>
<volume>21</volume>
<journal>Inform. Spektrum</journal>
<number>3</number>
<url>db/journals/insk/insk21.html#Gartner98</url>
</article>
</r>
<coauthors n="356" nc="3">
<co c="0"><na f="a/Abdullah:Lamya" pid="211/3348">Lamya Abdullah</na></co>
<co c="0"><na f="a/Albert:Bruno" pid="155/4657">Bruno Albert</na></co>
<co c="0"><na f="a/Alsbih:Amir" pid="00/11333">Amir Alsbih</na></co>
<co c="0"><na f="a/Anderson_0002:Philip" pid="66/6659-2">Philip Anderson 0002</na></co>
<co c="0"><na f="a/Anikeev:Maxim" pid="74/5976">Maxim Anikeev</na></co>
<co c="0"><na f="a/Apel:Sven" pid="a/SvenApel">Sven Apel</na></co>
<co c="0"><na f="a/Armknecht:Frederik" pid="65/6856">Frederik Armknecht</na></co>
<co c="0"><na f="a/Arriola:Iratxe_Soraluze" pid="97/6338">Iratxe Soraluze Arriola</na></co>
<co c="0"><na f="a/Atkinson_0001:Colin" pid="a/ColinAtkinson">Colin Atkinson 0001</na></co>
<co c="0"><na f="a/Attenberger:Andreas" pid="75/10830">Andreas Attenberger</na></co>
<co c="0"><na f="a/Avoine:Gildas" pid="a/GildasAvoine">Gildas Avoine</na></co>
<co c="0"><na f="b/B=auml=cker:Matthias" pid="89/11329">Matthias B&#228;cker</na></co>
<co c="0"><na f="b/Baecher:Paul" pid="15/1510">Paul Baecher</na></co>
<co c="0"><na f="b/Baier:Harald" pid="20/151">Harald Baier</na></co>
<co c="0"><na f="b/Bajramovic:Edita" pid="188/1036">Edita Bajramovic</na></co>
<co c="0"><na f="b/Bakkouch:Mouad" pid="381/7951">Mouad Bakkouch</na></co>
<co c="0"><na f="b/Barth:Florian" pid="49/9612">Florian Barth</na></co>
<co c="0"><na f="b/Bauer_0004:Johannes" pid="23/2293-4">Johannes Bauer 0004</na></co>
<co c="2"><na f="b/Bayreuther:Konstantin" pid="424/0893">Konstantin Bayreuther</na></co>
<co c="0"><na f="b/Becher:Michael" pid="68/1453">Michael Becher</na></co>
<co c="0"><na f="b/Becker:Tobias" pid="27/258">Tobias Becker</na></co>
<co c="0"><na f="b/Benenson:Zinaida" pid="b/ZBenenson">Zinaida Benenson</na></co>
<co c="0"><na f="b/Bergmann:Paul" pid="207/7685">Paul Bergmann</na></co>
<co c="0"><na f="b/Bernstein:Abraham" pid="b/AbrahamBernstein">Abraham Bernstein</na></co>
<co c="0"><na f="b/Bestehorn:Markus" pid="49/5026">Markus Bestehorn</na></co>
<co c="0"><na f="b/Biersack:Ernst_W=" pid="e/ErnstWBiersack">Ernst W. Biersack</na></co>
<co c="0" n="2"><na f="b/Blass:Erik=Oliver" pid="14/2769">Erik-Oliver Blass</na><na>Erik-Oliver Bla&#223;</na></co>
<co c="0"><na f="b/B=ouml=hm:Klemens" pid="b/KBohm">Klemens B&#246;hm</na></co>
<co c="0"><na f="b/B=ouml=hme:Rainer" pid="52/6295">Rainer B&#246;hme</na></co>
<co c="0"><na f="b/Bohn_0001:J=uuml=rgen" pid="56/5161-1">J&#252;rgen Bohn 0001</na></co>
<co c="0"><na f="b/Bornh=ouml=vd:Christof" pid="34/1731">Christof Bornh&#246;vd</na></co>
<co c="0"><na f="b/Bos:Herbert" pid="91/800">Herbert Bos</na></co>
<co c="0"><na f="b/Breitinger:Frank" pid="66/9068">Frank Breitinger</na></co>
<co c="0"><na f="b/Brodowski:Dominik" pid="145/1426">Dominik Brodowski</na></co>
<co c="0"><na f="b/Brost:Julian" pid="277/8094">Julian Brost</na></co>
<co c="0"><na f="b/Buchin:Maike" pid="41/2907">Maike Buchin</na></co>
<co c="0"><na f="b/Buchmann:Alejandro_P=" pid="b/APBuchmann">Alejandro P. Buchmann</na></co>
<co c="0"><na f="b/Buchmann:Erik" pid="11/226">Erik Buchmann</na></co>
<co c="0"><na f="b/Bulck:Jo_Van" pid="167/1573">Jo Van Bulck</na></co>
<co c="0"><na f="b/Bunse:Christian" pid="12/6986">Christian Bunse</na></co>
<co c="0"><na f="b/Busch:Marcel" pid="204/4058">Marcel Busch</na></co>
<co c="0"><na f="b/Butty=aacute=n:Levente" pid="84/3267">Levente Butty&#225;n</na></co>
<co c="0"><na f="c/Cachin:Christian" pid="c/ChristianCachin">Christian Cachin</na></co>
<co c="0"><na f="c/Castello=Waldow:Tim_Phillip" pid="337/1130">Tim Phillip Castello-Waldow</na></co>
<co c="0"><na f="c/Cavallaro:Lorenzo" pid="95/5162">Lorenzo Cavallaro</na></co>
<co c="0"><na f="c/Cengiz:=Uuml=same" pid="353/0235">&#220;same Cengiz</na></co>
<co c="0"><na f="c/Cerny:Christian" pid="390/2755">Christian Cerny</na></co>
<co c="0"><na f="c/Cholewinski:Peter_M=" pid="07/755">Peter M. Cholewinski</na></co>
<co c="0"><na f="c/Cilia:Mariano" pid="c/MarianoCilia">Mariano Cilia</na></co>
<co c="0"><na f="c/Clercq:Ruan_de" pid="135/8075">Ruan de Clercq</na></co>
<co c="0"><na f="c/Corti=ntilde=as:Roberto" pid="67/827">Roberto Corti&#241;as</na></co>
<co c="0"><na f="d/Dahl:Frederic" pid="95/6905">Frederic Dahl</na></co>
<co c="0"><na f="d/Daiya:Harish" pid="57/4900">Harish Daiya</na></co>
<co c="0"><na f="d/Deifel:Hans=Peter" pid="207/8276">Hans-Peter Deifel</na></co>
<co c="0"><na f="d/Delporte=Gallet:Carole" pid="d/CDelporteGallet">Carole Delporte-Gallet</na></co>
<co c="0"><na f="d/Deuber:Dominic" pid="216/3907">Dominic Deuber</na></co>
<co c="0"><na f="d/Dewald:Andreas" pid="30/7968">Andreas Dewald</na></co>
<co c="0" n="2"><na f="d/Dietrich_0005:Christian" pid="30/5956-5">Christian Dietrich 0005</na><na>Christian J. Dietrich</na></co>
<co c="0"><na f="d/Dimitriou:Tassos" pid="18/4520">Tassos Dimitriou</na></co>
<co c="0"><na f="d/Dirauf:Richard" pid="270/4048">Richard Dirauf</na></co>
<co c="0"><na f="d/Dittmann:Jana" pid="d/JDittmann">Jana Dittmann</na></co>
<co c="0"><na f="d/Dornseif:Maximillian" pid="d/MDornseif">Maximillian Dornseif</na></co>
<co c="0"><na f="d/Drafz:Julia" pid="319/8427">Julia Drafz</na></co>
<co c="0"><na f="d/Dreier:Lisa_Marie" pid="226/4514">Lisa Marie Dreier</na></co>
<co c="0"><na f="d/Drescher:Gabor" pid="144/2453">Gabor Drescher</na></co>
<co c="0"><na f="d/Dressler:Falko" pid="d/FalkoDressler">Falko Dressler</na></co>
<co c="0"><na f="d/D=uuml=sel:Linus" pid="319/8115">Linus D&#252;sel</na></co>
<co c="0"><na f="e/Ebbers:Simon" pid="294/8819">Simon Ebbers</na></co>
<co c="0"><na f="e/Echtler:Florian" pid="01/2452">Florian Echtler</na></co>
<co c="0"><na f="e/Eckhardt:Dennis" pid="378/5701">Dennis Eckhardt</na></co>
<co c="0"><na f="e/Effelsberg:Wolfgang" pid="e/WEffelsberg">Wolfgang Effelsberg</na></co>
<co c="0"><na f="e/Ehlert:Ralf" pid="53/7693">Ralf Ehlert</na></co>
<co c="0"><na f="e/Eichenm=uuml=ller:Christian" pid="345/2198">Christian Eichenm&#252;ller</na></co>
<co c="0"><na f="e/Eichhorn:Maximilian" pid="326/2414">Maximilian Eichhorn</na></co>
<co c="0"><na f="e/Einzinger:Christoph" pid="316/2797">Christoph Einzinger</na></co>
<co c="0"><na f="e/Engelberth:Markus" pid="99/7357">Markus Engelberth</na></co>
<co c="0"><na f="e/Erhardt:Christoph" pid="43/11521">Christoph Erhardt</na></co>
<co c="0"><na f="e/Erlacher:Felix" pid="145/5199">Felix Erlacher</na></co>
<co c="0"><na f="e/E=szlig=er:Hans=Georg" pid="79/814">Hans-Georg E&#223;er</na></co>
<co c="0"><na f="e/Eusgeld:Irene" pid="56/5802">Irene Eusgeld</na></co>
<co c="0"><na f="f/Fauconnier:Hugues" pid="12/7013">Hugues Fauconnier</na></co>
<co c="0"><na f="f/Faust:Fabian" pid="280/3092">Fabian Faust</na></co>
<co c="0"><na f="f/Fein:Christofer" pid="170/2701">Christofer Fein</na></co>
<co c="0"><na f="f/Fetzer:Christof" pid="f/ChristofFetzer">Christof Fetzer</na></co>
<co c="0"><na f="f/Fiege:Ludger" pid="73/1084">Ludger Fiege</na></co>
<co c="0"><na f="f/Fleischer:Fabian" pid="271/4845">Fabian Fleischer</na></co>
<co c="0"><na f="f/F=ouml=rster:Anna" pid="84/1516">Anna F&#246;rster</na></co>
<co c="0"><na f="f/Fort:Milan" pid="31/6728">Milan Fort</na></co>
<co c="0"><na f="f/Frings:Sandra" pid="45/90">Sandra Frings</na></co>
<co c="0"><na f="f/Frinken:Marius" pid="390/2044">Marius Frinken</na></co>
<co c="0"><na f="f/Fukami:Aya" pid="210/3254">Aya Fukami</na></co>
<co c="0"><na f="g/Gascon:Hugo" pid="93/10527">Hugo Gascon</na></co>
<co c="0"><na f="g/Gebhard:Sven" pid="398/0962">Sven Gebhard</na></co>
<co c="0"><na f="g/Gense:Stefan" pid="381/8790">Stefan Gense</na></co>
<co c="0"><na f="g/Gerbig:Ralph" pid="57/11440">Ralph Gerbig</na></co>
<co c="0"><na f="g/Gernler:Alexander_von" pid="07/10980">Alexander von Gernler</na></co>
<co c="0"><na f="g/Geus:Julian" pid="253/1877">Julian Geus</na></co>
<co c="0"><na f="g/Ghajar=Azadanlou:Marjan" pid="43/1807">Marjan Ghajar-Azadanlou</na></co>
<co c="-1"><na f="g/Ghosh:Sukumar" pid="42/6508">Sukumar Ghosh</na></co>
<co c="0"><na f="g/Giannetsos:Thanassis" pid="96/1667">Thanassis Giannetsos</na></co>
<co c="0"><na f="g/Glanzmann:Thomas" pid="306/0808">Thomas Glanzmann</na></co>
<co c="0"><na f="g/Gla=szlig=:Michael" pid="57/6207">Michael Gla&#223;</na></co>
<co c="0"><na f="g/Gloe:Thomas" pid="11/4347">Thomas Gloe</na></co>
<co c="0"><na f="g/G=ouml=bel:Jan" pid="18/1333">Jan G&#246;bel</na></co>
<co c="0"><na f="g/G=ouml=bel_0001:Oliver" pid="53/5309-1">Oliver G&#246;bel 0001</na></co>
<co c="0"><na f="g/Gollmann:Dieter" pid="39/5760">Dieter Gollmann</na></co>
<co c="0"><na f="g/Gorecki:Christian" pid="01/2220">Christian Gorecki</na></co>
<co c="0"><na f="g/G=ouml=tzfried:Johannes" pid="147/1799">Johannes G&#246;tzfried</na></co>
<co c="0"><na f="g/Grimm:R=uuml=diger" pid="g/RGrimm">R&#252;diger Grimm</na></co>
<co c="0"><na f="g/Groll:Andr=eacute=" pid="44/11349">Andr&#233; Groll</na></co>
<co c="0"><na f="g/Gro=szlig=:Tobias" pid="227/6441">Tobias Gro&#223;</na></co>
<co c="0"><na f="g/Gro=szlig=pietsch:Karl=Erwin" pid="81/6983">Karl-Erwin Gro&#223;pietsch</na></co>
<co c="0"><na f="g/Gruber_0001:Jan" pid="76/11015-1">Jan Gruber 0001</na></co>
<co c="0"><na f="g/Gruhn:Michael" pid="147/1759">Michael Gruhn</na></co>
<co c="0"><na f="g/Guerraoui:Rachid" pid="g/RachidGuerraoui">Rachid Guerraoui</na></co>
<co c="0"><na f="g/G=uuml=nther:Detlef" pid="53/1105">Detlef G&#252;nther</na></co>
<co c="0"><na f="h/Haasnoot:Jaap" pid="408/2156">Jaap Haasnoot</na></co>
<co c="0"><na f="h/Hadasch:Frank" pid="124/3770">Frank Hadasch</na></co>
<co c="0"><na f="h/Hahn:Sebastian" pid="179/2825">Sebastian Hahn</na></co>
<co c="0"><na f="h/Hammer_0003:Andreas" pid="232/0279-3">Andreas Hammer 0003</na></co>
<co c="0"><na f="h/Hammerschmidt:Ernest" pid="32/405">Ernest Hammerschmidt</na></co>
<co c="0"><na f="h/Handurukande:Sidath_B=" pid="25/3100">Sidath B. Handurukande</na></co>
<co c="0"><na f="h/H=auml=nsch:Norman" pid="155/4403">Norman H&#228;nsch</na></co>
<co c="0"><na f="h/Hantke:Florian" pid="277/2819">Florian Hantke</na></co>
<co c="0"><na f="h/Hardi:Lukas" pid="337/1113">Lukas Hardi</na></co>
<co c="0" n="2"><na f="h/Hargreaves:Christopher_James" pid="07/5792">Christopher James Hargreaves</na><na>Christopher Hargreaves</na></co>
<co c="0"><na f="h/Hartmann:Laura" pid="252/8227">Laura Hartmann</na></co>
<co c="0"><na f="h/Hasselbring:Wilhelm" pid="h/WilhelmHasselbring">Wilhelm Hasselbring</na></co>
<co c="0"><na f="h/Heckmann:Dirk" pid="08/9190">Dirk Heckmann</na></co>
<co c="-1"><na f="h/Heinson:Dennis" pid="87/7271">Dennis Heinson</na></co>
<co c="0"><na f="h/Hellmich:Andreas" pid="337/1159">Andreas Hellmich</na></co>
<co c="0"><na f="h/Henseler:Hans" pid="52/8918">Hans Henseler</na></co>
<co c="0"><na f="h/Herlihy:Maurice" pid="h/MauriceHerlihy">Maurice Herlihy</na></co>
<co c="0"><na f="h/Herrmann:Dominik" pid="37/5937">Dominik Herrmann</na></co>
<co c="0"><na f="h/Hintz:Nadina" pid="145/1413">Nadina Hintz</na></co>
<co c="0"><na f="h/Hoepman:Jaap=Henk" pid="h/JaapHenkHoepman">Jaap-Henk Hoepman</na></co>
<co c="0"><na f="h/Hoffmann:Johannes" pid="34/8008">Johannes Hoffmann</na></co>
<co c="0"><na f="h/H=ouml=lldobler:Steffen" pid="48/415">Steffen H&#246;lldobler</na></co>
<co c="0"><na f="h/Holz:Thorsten" pid="h/ThorstenHolz">Thorsten Holz</na></co>
<co c="0"><na f="h/Hoppmann:Tobias" pid="429/9298">Tobias Hoppmann</na></co>
<co c="0"><na f="h/Hornung:Gerrit" pid="30/1501">Gerrit Hornung</na></co>
<co c="-1"><na f="h/H=ouml=sch:Leonhard" pid="217/0280">Leonhard H&#246;sch</na></co>
<co c="0"><na f="h/Hund:Ralf" pid="01/8882">Ralf Hund</na></co>
<co c="0"><na f="i/Ikinci:Ali" pid="10/3855">Ali Ikinci</na></co>
<co c="0"><na f="i/Irons:Alastair" pid="47/3067">Alastair Irons</na></co>
<co c="0"><na f="j/Jawurek:Marek" pid="97/1430">Marek Jawurek</na></co>
<co c="0"><na f="j/Jhumka:Arshad" pid="45/4421">Arshad Jhumka</na></co>
<co c="0"><na f="j/Jung:Christoph" pid="67/6076">Christoph Jung</na></co>
<co c="0"><na f="k/K=auml=lber:Sven" pid="133/5061">Sven K&#228;lber</na></co>
<co c="0" n="2"><na f="k/Kamhuber:Monika" pid="205/6042-1">Monika Kamhuber</na><na>Monika Huber 0001</na></co>
<co c="0"><na f="k/Kasten:Oliver" pid="84/1731">Oliver Kasten</na></co>
<co c="0"><na f="k/Katzenbeisser_0001:Stefan" pid="66/3585-1">Stefan Katzenbeisser 0001</na></co>
<co c="0"><na f="k/Keidar:Idit" pid="k/IditKeidar">Idit Keidar</na></co>
<co c="0"><na f="k/Keller:Hubert_B=" pid="16/1206">Hubert B. Keller</na></co>
<co c="0"><na f="k/Kesdogan:Dogan" pid="21/1324">Dogan Kesdogan</na></co>
<co c="0"><na f="k/Kilic:Mahir" pid="73/7434">Mahir Kilic</na></co>
<co c="0"><na f="k/Kiltz:Stefan" pid="91/1808">Stefan Kiltz</na></co>
<co c="0"><na f="k/Kirchner:Matthias" pid="97/1874">Matthias Kirchner</na></co>
<co c="0"><na f="k/Klauser:Joanna" pid="423/5040">Joanna Klauser</na></co>
<co c="-1"><na f="k/Kloppenburg:Sven" pid="29/1062">Sven Kloppenburg</na></co>
<co c="0"><na f="k/Knaus:Alexander" pid="211/0367">Alexander Knaus</na></co>
<co c="0"><na f="k/Knepper:Annika" pid="337/1267">Annika Knepper</na></co>
<co c="0"><na f="k/Koetter:Markus" pid="37/6245">Markus Koetter</na></co>
<co c="0"><na f="k/K=ouml=nig:Hartmut" pid="k/HartmutKonig">Hartmut K&#246;nig</na></co>
<co c="0"><na f="k/Koschate=Fischer:Nicole" pid="243/5885">Nicole Koschate-Fischer</na></co>
<co c="0"><na f="k/Kossakowski:Klaus=Peter" pid="27/3822">Klaus-Peter Kossakowski</na></co>
<co c="0"><na f="k/K=ouml=stler:Johannes" pid="37/10574">Johannes K&#246;stler</na></co>
<co c="0"><na f="k/Kotschi:Lukas" pid="408/0091">Lukas Kotschi</na></co>
<co c="0"><na f="k/Kov=aacute=cs:Steve" pid="145/1366">Steve Kov&#225;cs</na></co>
<co c="0"><na f="k/Krontiris:Ioannis" pid="32/1264">Ioannis Krontiris</na></co>
<co c="0"><na f="k/K=uuml=hrer:Marc" pid="85/10265">Marc K&#252;hrer</na></co>
<co c="0"><na f="k/Kursawe:Klaus" pid="28/3604">Klaus Kursawe</na></co>
<co c="0"><na f="k/Kurtz_0001:Andreas" pid="133/2821-1">Andreas Kurtz 0001</na></co>
<co c="0"><na f="k/Kuznetsov:Petr" pid="k/PetrKouznetsov">Petr Kuznetsov</na></co>
<co c="0"><na f="l/Lafuente:Alberto" pid="29/3916">Alberto Lafuente</na></co>
<co c="0"><na f="l/Laing:Christopher" pid="84/5588">Christopher Laing</na></co>
<co c="1"><na f="l/Lambertz:Christian" pid="53/5762">Christian Lambertz</na></co>
<co c="0"><na f="l/L=auml=mmle:Carolin" pid="429/6164">Carolin L&#228;mmle</na></co>
<co c="0"><na f="l/Lang_0001:Andreas" pid="88/5471-1">Andreas Lang 0001</na></co>
<co c="0"><na f="l/Larrea:Mikel" pid="l/MikelLarrea">Mikel Larrea</na></co>
<co c="0"><na f="l/Lassak:Leona" pid="301/5833">Leona Lassak</na></co>
<co c="0"><na f="l/Latzo:Tobias" pid="217/6939">Tobias Latzo</na></co>
<co c="0"><na f="l/Lautner:Immanuel" pid="408/3594">Immanuel Lautner</na></co>
<co c="0"><na f="l/Lenhof:Hans=Peter" pid="l/HPLenhof">Hans-Peter Lenhof</na></co>
<co c="0"><na f="l/L=eacute=vy:Nicole" pid="18/6032">Nicole L&#233;vy</na></co>
<co c="-1"><na f="l/Liebchen:Jens" pid="35/1968">Jens Liebchen</na></co>
<co c="0"><na f="l/Liebig:Christoph" pid="12/2156">Christoph Liebig</na></co>
<co c="0"><na f="l/Liegl:Marion" pid="60/11331">Marion Liegl</na></co>
<co c="0"><na f="l/Lindenmeier:Christian" pid="381/1579">Christian Lindenmeier</na></co>
<co c="0"><na f="l/Lohmann:Daniel" pid="57/863">Daniel Lohmann</na></co>
<co c="0"><na f="l/Lorch:Benedikt" pid="171/8502">Benedikt Lorch</na></co>
<co c="0"><na f="l/Lucks:Stefan" pid="l/SLucks">Stefan Lucks</na></co>
<co c="0"><na f="m/M=auml=ckl:Richard" pid="133/2417">Richard M&#228;ckl</na></co>
<co c="0"><na f="m/Maedche:Alexander" pid="34/590">Alexander Maedche</na></co>
<co c="0"><na f="m/Maene:Pieter" pid="165/8395">Pieter Maene</na></co>
<co c="0"><na f="m/Mai:Christoph" pid="88/4796">Christoph Mai</na></co>
<co c="1"><na f="m/Majster=Cederbaum:Mila_E=" pid="70/3602">Mila E. Majster-Cederbaum</na></co>
<co c="0"><na f="m/Majuntke:Matthias" pid="99/2376">Matthias Majuntke</na></co>
<co c="0"><na f="m/Malik:Simon" pid="305/9955">Simon Malik</na></co>
<co c="-1"><na f="m/Mantel:Heiko" pid="m/HeikoMantel">Heiko Mantel</na></co>
<co c="0"><na f="m/Massonne:Werner" pid="87/6832">Werner Massonne</na></co>
<co c="0"><na f="m/Meixner:Matthias" pid="13/953">Matthias Meixner</na></co>
<co c="0"><na f="m/Mendling:Jan" pid="m/JanMendling">Jan Mendling</na></co>
<co c="0"><na f="m/Menges:Florian" pid="214/8801">Florian Menges</na></co>
<co c="0"><na f="m/Milius:Stefan" pid="m/StefanMilius">Stefan Milius</na></co>
<co c="0"><na f="m/Mink:Martin" pid="55/901">Martin Mink</na></co>
<co c="0"><na f="m/Mittal:Neeraj" pid="11/5490">Neeraj Mittal</na></co>
<co c="0"><na f="m/Moch:Christian" pid="30/7693">Christian Moch</na></co>
<co c="0"><na f="m/Molitor:Paul" pid="m/PMolitor">Paul Molitor</na></co>
<co c="0"><na f="m/Morgenstern:Holger" pid="31/7693">Holger Morgenstern</na></co>
<co c="0"><na f="m/Morgner:Philipp" pid="180/3872">Philipp Morgner</na></co>
<co c="0"><na f="m/Mottok:J=uuml=rgen" pid="16/6896">J&#252;rgen Mottok</na></co>
<co c="0"><na f="m/Moussa:Denise" pid="305/3934">Denise Moussa</na></co>
<co c="0"><na f="m/M=uuml=hl:Gero" pid="17/6562">Gero M&#252;hl</na></co>
<co c="0"><na f="m/M=uuml=hlberg:Jan_Tobias" pid="84/4044">Jan Tobias M&#252;hlberg</na></co>
<co c="0"><na f="m/Mullan:Patrick" pid="171/7797">Patrick Mullan</na></co>
<co c="0"><na f="m/M=uuml=ller_0001:Benjamin" pid="16/7215">Benjamin M&#252;ller 0001</na></co>
<co c="0"><na f="m/M=uuml=ller:Nico" pid="257/8236">Nico M&#252;ller</na></co>
<co c="0"><na f="m/M=uuml=ller:Tilo" pid="08/7968">Tilo M&#252;ller</na></co>
<co c="0"><na f="m/M=uuml=nch:Isabel" pid="26/5492">Isabel M&#252;nch</na></co>
<co c="0"><na f="m/M=uuml=ter:Michael" pid="66/11147">Michael M&#252;ter</na></co>
<co c="0"><na f="n/Nedon:Jens" pid="25/5504">Jens Nedon</na></co>
<co c="0"><na f="n/Nemetz:Sebastian" pid="217/0258">Sebastian Nemetz</na></co>
<co c="0"><na f="n/Neumann:Gustaf" pid="44/4448">Gustaf Neumann</na></co>
<co c="0"><na f="n/Nicolai:Florian" pid="373/4012">Florian Nicolai</na></co>
<co c="0"><na f="n/Noorman:Job" pid="119/6689">Job Noorman</na></co>
<co c="0"><na f="o/Ohlig:Mathis" pid="390/1855">Mathis Ohlig</na></co>
<co c="0"><na f="o/Ottmann:Jenny" pid="229/0013">Jenny Ottmann</na></co>
<co c="0"><na f="p/Pagnia:Henning" pid="48/6548">Henning Pagnia</na></co>
<co c="0"><na f="p/Palutke:Ralph" pid="191/8080">Ralph Palutke</na></co>
<co c="0"><na f="p/Penso:Lucia_Draque" pid="p/LuciaDPenso">Lucia Draque Penso</na></co>
<co c="0"><na f="p/Pernul:G=uuml=nther" pid="p/GPernul">G&#252;nther Pernul</na></co>
<co c="0"><na f="p/Pfeiffer:Sabine" pid="145/8667">Sabine Pfeiffer</na></co>
<co c="0"><na f="p/Pfitzmann:Birgit" pid="p/BPfitzmann">Birgit Pfitzmann</na></co>
<co c="0"><na f="p/Phaneesh:Kuppahalli_L=" pid="02/732">Kuppahalli L. Phaneesh</na></co>
<co c="0"><na f="p/Piessens:Frank" pid="85/6647">Frank Piessens</na></co>
<co c="0"><na f="p/Pimenidis:Lexi" pid="51/730">Lexi Pimenidis</na></co>
<co c="-1"><na f="p/Pleisch:Stefan" pid="23/1987">Stefan Pleisch</na></co>
<co c="0"><na f="p/Pohl:Niclas" pid="424/0574">Niclas Pohl</na></co>
<co c="0"><na f="p/Pohlmann:Norbert" pid="30/6630">Norbert Pohlmann</na></co>
<co c="0" n="2"><na f="p/P=ouml=hls:Henrich_Christopher" pid="69/154">Henrich Christopher P&#246;hls</na><na>Henrich C. P&#246;hls</na></co>
<co c="0"><na f="p/Polc=aacute=k:Radim" pid="85/10686">Radim Polc&#225;k</na></co>
<co c="0"><na f="p/Pollach:Johannes" pid="297/8685">Johannes Pollach</na></co>
<co c="0"><na f="p/Posegga:Joachim" pid="p/JPosegga">Joachim Posegga</na></co>
<co c="0"><na f="p/Preneel:Bart" pid="p/BartPreneel">Bart Preneel</na></co>
<co c="0" n="2"><na f="p/Protsenko:Mykolai" pid="140/0788">Mykolai Protsenko</na><na>Mykola Protsenko</na></co>
<co c="0"><na f="p/Puchta:Alexander" pid="217/6981">Alexander Puchta</na></co>
<co c="0"><na f="p/Pugliese:Gaston" pid="173/2644">Gaston Pugliese</na></co>
<co c="0"><na f="q/Quintero:Juan" pid="211/3416">Juan Quintero</na></co>
<co c="0"><na f="r/Rannenberg:Kai" pid="r/KRannenberg">Kai Rannenberg</na></co>
<co c="0"><na f="r/Reimer:Helmut" pid="17/1757">Helmut Reimer</na></co>
<co c="0"><na f="r/Reinfelder:Lena" pid="128/9227">Lena Reinfelder</na></co>
<co c="0"><na f="r/Reischuk:R=uuml=diger" pid="r/RReischuk">R&#252;diger Reischuk</na></co>
<co c="0"><na f="r/Reiser:Hans_P=" pid="28/2554">Hans P. Reiser</na></co>
<co c="0"><na f="r/Reitenspie=szlig=:Manfred" pid="80/1305">Manfred Reitenspie&#223;</na></co>
<co c="0"><na f="r/Reussner:Ralf_H=" pid="r/RalfReussner">Ralf H. Reussner</na></co>
<co c="0"><na f="r/Rieck:Konrad" pid="64/4020">Konrad Rieck</na></co>
<co c="0"><na f="r/Rieger:Martin" pid="145/1386">Martin Rieger</na></co>
<co c="0"><na f="r/Riess:Christian" pid="21/8108">Christian Riess</na></co>
<co c="0"><na f="r/Rietz:Ren=eacute=" pid="27/6161">Ren&#233; Rietz</na></co>
<co c="0"><na f="r/R=ouml=ckl:Jonas" pid="249/4099">Jonas R&#246;ckl</na></co>
<co c="0"><na f="r/Rodrigues:Lu=iacute=s_E=_T=" pid="r/LRodrigues">Lu&#237;s E. T. Rodrigues</na></co>
<co c="0"><na f="r/Rohner:Christian" pid="18/1549">Christian Rohner</na></co>
<co c="0" n="2"><na f="r/R=ouml=mer:Kay" pid="r/KayRomer">Kay R&#246;mer</na><na>Kay Uwe R&#246;mer</na></co>
<co c="0"><na f="r/R=ouml=sler:Paul" pid="185/1611">Paul R&#246;sler</na></co>
<co c="0"><na f="r/Rossow:Christian" pid="08/6024">Christian Rossow</na></co>
<co c="0"><na f="r/R=uuml=ckert:Christian" pid="32/957">Christian R&#252;ckert</na></co>
<co c="0"><na f="r/Ruderich:Simon" pid="295/0721">Simon Ruderich</na></co>
<co c="0"><na f="r/Rzepka:Lisa" pid="390/2834">Lisa Rzepka</na></co>
<co c="0"><na f="s/Sack:Konstantin" pid="144/1355">Konstantin Sack</na></co>
<co c="0"><na f="s/Safferling:Christoph" pid="179/2529">Christoph Safferling</na></co>
<co c="0"><na f="s/Saglietti:Francesca" pid="03/6880">Francesca Saglietti</na></co>
<co c="-1"><na f="s/Santen:Thomas" pid="79/4203">Thomas Santen</na></co>
<co c="0"><na f="s/Sasse:M=_Angela" pid="s/MASasse">M. Angela Sasse</na></co>
<co c="0"><na f="s/Savchenko:Ella" pid="381/8518">Ella Savchenko</na></co>
<co c="0"><na f="s/Schadt:Dirk" pid="61/5686">Dirk Schadt</na></co>
<co c="0"><na f="s/Schankin:Andrea" pid="78/6239">Andrea Schankin</na></co>
<co c="0"><na f="s/Scheler:Nicole" pid="297/8741">Nicole Scheler</na></co>
<co c="0"><na f="s/Scheuermann_0001:Bj=ouml=rn" pid="15/503-1">Bj&#246;rn Scheuermann 0001</na></co>
<co c="0"><na f="s/Schiller:Jan" pid="238/4798">Jan Schiller</na></co>
<co c="0"><na f="s/Schindelhauer:Christian" pid="s/ChristianSchindelhauer">Christian Schindelhauer</na></co>
<co c="0"><na f="s/Schinzel:Sebastian" pid="43/11495">Sebastian Schinzel</na></co>
<co c="2"><na f="s/Schmid:Kerstin" pid="314/2884">Kerstin Schmid</na></co>
<co c="0"><na f="s/Schmitt:Sven" pid="84/10985">Sven Schmitt</na></co>
<co c="0"><na f="s/Schneider:Janine" pid="297/8832">Janine Schneider</na></co>
<co c="0"><na f="s/Scholtes:Ingo" pid="s/IngoScholtes">Ingo Scholtes</na></co>
<co c="0"><na f="s/Sch=ouml=nbein:Christian" pid="45/10983">Christian Sch&#246;nbein</na></co>
<co c="0"><na f="s/Schorradt:Stefan" pid="251/5922">Stefan Schorradt</na></co>
<co c="0"><na f="s/Schreck:Thomas" pid="71/1928">Thomas Schreck</na></co>
<co c="0"><na f="s/Schr=ouml=der:Dominique" pid="52/6199">Dominique Schr&#246;der</na></co>
<co c="0"><na f="s/Schuhr:Jan_C=" pid="173/2721">Jan C. Schuhr</na></co>
<co c="0"><na f="s/Schulze:Matti" pid="384/6111">Matti Schulze</na></co>
<co c="0"><na f="s/Sch=uuml=tz:Philip" pid="134/3346">Philip Sch&#252;tz</na></co>
<co c="0"><na f="s/Schweikardt:Nicole" pid="s/NicoleSchweikardt">Nicole Schweikardt</na></co>
<co c="-1"><na f="s/Schwittay:Bastian" pid="95/2797">Bastian Schwittay</na></co>
<co c="0"><na f="s/Shapiro_0001:Marc" pid="s/MarcShapiro">Marc Shapiro 0001</na></co>
<co c="0"><na f="s/Sobola:Sabine" pid="288/1931">Sabine Sobola</na></co>
<co c="0"><na f="s/Spath:Hans" pid="133/2365">Hans Spath</na></co>
<co c="0"><na f="s/Spiliopoulou:Myra" pid="s/MyraSpiliopoulou">Myra Spiliopoulou</na></co>
<co c="0"><na f="s/Spreitzenbarth:Michael" pid="33/8965">Michael Spreitzenbarth</na></co>
<co c="0"><na f="s/Stachak:Marcel" pid="375/5947">Marcel Stachak</na></co>
<co c="0"><na f="s/Steen:Maarten_van" pid="s/MaartenvanSteen">Maarten van Steen</na></co>
<co c="0"><na f="s/Steiner:Moritz" pid="31/2767">Moritz Steiner</na></co>
<co c="0"><na f="s/Stock:Ben" pid="136/8343">Ben Stock</na></co>
<co c="0"><na f="s/St=ouml=rrle:Harald" pid="39/5044">Harald St&#246;rrle</na></co>
<co c="0"><na f="s/Stoykova:Radina" pid="270/4026">Radina Stoykova</na></co>
<co c="0"><na f="s/Stritter:Benjamin" pid="178/8065">Benjamin Stritter</na></co>
<co c="0"><na f="s/St=uuml=ttgen:Johannes" pid="43/10985">Johannes St&#252;ttgen</na></co>
<co c="0"><na f="s/Suri:Neeraj" pid="s/NeerajSuri">Neeraj Suri</na></co>
<co c="0"><na f="s/S=uuml=sstrunk:Sabine" pid="s/SSusstrunk">Sabine S&#252;sstrunk</na></co>
<co c="0"><na f="t/Taubmann:Benjamin" pid="34/11538">Benjamin Taubmann</na></co>
<co c="0"><na f="t/Teich:J=uuml=rgen" pid="t/JurgenTeich">J&#252;rgen Teich</na></co>
<co c="0"><na f="t/Theel:Oliver_E=" pid="t/OliverETheel">Oliver E. Theel</na></co>
<co c="-1"><na f="t/Theisen:Marc" pid="63/3607">Marc Theisen</na></co>
<co c="0"><na f="t/Thierry:Aur=eacute=lien" pid="126/1038">Aur&#233;lien Thierry</na></co>
<co c="0"><na f="t/Tielmann:Andreas" pid="18/992">Andreas Tielmann</na></co>
<co c="0"><na f="t/Trinius:Philipp" pid="45/7272">Philipp Trinius</na></co>
<co c="0"><na f="t/Tro=szlig=bach:Markus" pid="145/1438">Markus Tro&#223;bach</na></co>
<co c="0"><na f="u/Uellenbeck:Sebastian" pid="49/10074">Sebastian Uellenbeck</na></co>
<co c="0"><na f="u/Ullrich:Steffen" pid="178/8190">Steffen Ullrich</na></co>
<co c="0"><na f="v/Vanini:C=eacute=line" pid="374/7498">C&#233;line Vanini</na></co>
<co c="0" n="2"><na f="v/Venkatesan_0001:S=" pid="43/5587-1">S. Venkatesan 0001</na><na>Subbarayan Venkatesan</na></co>
<co c="0"><na f="v/Verbauwhede:Ingrid" pid="92/16">Ingrid Verbauwhede</na></co>
<co c="0"><na f="v/Vielberth:Manfred" pid="217/6903">Manfred Vielberth</na></co>
<co c="0"><na f="v/Vielhauer:Claus" pid="v/CVielhauer">Claus Vielhauer</na></co>
<co c="0"><na f="v/Vogt:Harald" pid="01/1773">Harald Vogt</na></co>
<co c="0"><na f="v/Vogt:Holger" pid="07/3277">Holger Vogt</na></co>
<co c="0"><na f="v/Voigt:Lena_L=" pid="330/8697">Lena L. Voigt</na></co>
<co c="0"><na f="v/V=ouml=lzer:Hagen" pid="10/3990">Hagen V&#246;lzer</na></co>
<co c="0"><na f="v/V=ouml=mel:Stefan" pid="08/10001">Stefan V&#246;mel</na></co>
<co c="0"><na f="v/Vukolic:Marko" pid="57/6250">Marko Vukolic</na></co>
<co c="0"><na f="w/Waidner:Michael" pid="90/308">Michael Waidner</na></co>
<co c="0"><na f="w/Walter:Max" pid="62/5262">Max Walter</na></co>
<co c="0"><na f="w/Warns:Timo" pid="85/3073">Timo Warns</na></co>
<co c="0"><na f="w/Weber:Tim" pid="118/1817">Tim Weber</na></co>
<co c="0"><na f="w/Wehrle:Klaus" pid="w/KlausWehrle">Klaus Wehrle</na></co>
<co c="0"><na f="w/Weichslgartner:Andreas" pid="34/9945">Andreas Weichslgartner</na></co>
<co c="0"><na f="w/Wendzel:Steffen" pid="53/3957">Steffen Wendzel</na></co>
<co c="0"><na f="w/Westman:Martin" pid="408/3247">Martin Westman</na></co>
<co c="0"><na f="w/Wicherski:Georg" pid="15/4600">Georg Wicherski</na></co>
<co c="0"><na f="w/Wild:Matthias" pid="295/1439">Matthias Wild</na></co>
<co c="0"><na f="w/Wildermann:Stefan" pid="24/5422">Stefan Wildermann</na></co>
<co c="0"><na f="w/Wilhelm:Uwe_G=" pid="94/2003">Uwe G. Wilhelm</na></co>
<co c="0"><na f="w/Wilke:Joachim" pid="66/9806">Joachim Wilke</na></co>
<co c="0"><na f="w/Willems:Carsten" pid="85/3643">Carsten Willems</na></co>
<co c="0"><na f="w/Wolf:Christopher" pid="36/2907">Christopher Wolf</na></co>
<co c="0"><na f="w/Wolf_0003:Julian" pid="66/7497-3">Julian Wolf 0003</na></co>
<co c="0"><na f="w/Wressnegger:Christian" pid="136/8406">Christian Wressnegger</na></co>
<co c="0"><na f="w/Wundram:Martin" pid="133/5070">Martin Wundram</na></co>
<co c="0"><na f="z/Zeidler:Andreas" pid="26/5583">Andreas Zeidler</na></co>
<co c="0"><na f="z/Zhuang:Yan" pid="02/5194">Yan Zhuang</na></co>
<co c="0"><na f="z/Zieger:Andrej" pid="396/4491">Andrej Zieger</na></co>
<co c="0"><na f="z/Zimmermann:Christian" pid="65/863">Christian Zimmermann</na></co>
<co c="0"><na f="z/Zitterbart:Martina" pid="z/MZitterbart">Martina Zitterbart</na></co>
<co c="0"><na f="z/Zoubek:Christian" pid="165/0486">Christian Zoubek</na></co>
<co c="0"><na f="z/Zwanger:Viviane" pid="141/2003">Viviane Zwanger</na></co>
</coauthors>
</dblpperson>

