Follow
Elmar Padilla
Elmar Padilla
Verified email at fkie.fraunhofer.de
Title
Cited by
Cited by
Year
Bonnmotion: a mobility scenario generation and analysis tool
N Aschenbruck, R Ernst, E Gerhards-Padilla, M Schwamborn
3rd International ICST Conference on Simulation Tools and Techniques, 2010
5592010
Discovre: Efficient cross-architecture identification of bugs in binary code.
S Eschweiler, K Yakdan, E Gerhards-Padilla
Ndss 52, 58-79, 2016
3302016
A comprehensive measurement study of domain generating malware
D Plohmann, K Yakdan, M Klatt, J Bader, E Gerhards-Padilla
25th USENIX Security Symposium (USENIX Security 16), 263-278, 2016
3032016
Modelling mobility in disaster area scenarios
N Aschenbruck, E Gerhards-Padilla, M Gerharz, M Frank, P Martini
Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation …, 2007
2952007
A survey on mobility models for performance analysis in tactical mobile networks
N Aschenbruck, E Gerhards-Padilla, P Martini
Journal of Telecommunications and Information Technology, 54-61, 2008
2012008
Helping johnny to analyze malware: A usability-optimized decompiler and malware analysis user study
K Yakdan, S Dechand, E Gerhards-Padilla, M Smith
2016 IEEE Symposium on Security and Privacy (SP), 158-177, 2016
1222016
Detecting black hole attacks in tactical MANETs using topology graphs
E Gerhards-Padilla, N Aschenbruck, P Martini, M Jahnke, J Tolle
32nd IEEE Conference on Local Computer Networks (LCN 2007), 1043-1052, 2007
1092007
Case study of the miner botnet
D Plohmann, E Gerhards-Padilla
2012 4th International Conference on Cyber Conflict (CYCON 2012), 1-16, 2012
1052012
No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantic-Preserving Transformations.
K Yakdan, S Eschweiler, E Gerhards-Padilla, M Smith
NDSS, 2015
1032015
Botnets: Detection, measurement, disinfection & defence
D Plohmann, E Gerhards-Padilla, F Leder
European Network and Information Security Agency (ENISA) 1 (1), 1-153, 2011
612011
PDF Scrutinizer: Detecting JavaScript-based attacks in PDF documents
F Schmitt, J Gassen, E Gerhards-Padilla
2012 tenth annual international conference on privacy, security and trust …, 2012
602012
Malpedia: a collaborative effort to inventorize the malware landscape
D Plohmann, M Clauss, S Enders, E Padilla
The Journal on Cybercrime and Digital Investigations 3 (1), 1-19, 2017
562017
Automatic extraction of domain name generation algorithms from current malware
T Barabosch, A Wichmann, F Leder, E Gerhards-Padilla
Proc. NATO Symposium IST-111 on Information Assurance and Cyber Defense …, 2012
412012
Botnets: Detection, measurement, disinfection and defence
G Hogben, D Plohmann, E Gerhards-Padilla, F Leder
European Network and Information Security Agency, 2011
342011
Bee master: Detecting host-based code injection attacks
T Barabosch, S Eschweiler, E Gerhards-Padilla
Detection of Intrusions and Malware, and Vulnerability Assessment: 11th …, 2014
282014
Detecting black hole attack in tactical MANETs using topology graph
E Padilla, N Aschenbruck, P Martini, M Jahnke, J Tolle
Proc. IEEE Conference on Local Computer Networks, 2007
272007
Nebula-generating syntactical network intrusion signatures
T Werner, C Fuchs, E Gerhards-Padilla, P Martini
2009 4th International Conference on Malicious and Unwanted Software …, 2009
262009
BRAT: A BRidge Attack Tool for cyber security assessments of maritime systems
C Hemminghaus, J Bauer, E Padilla
TransNav: International Journal on Marine Navigation and Safety of Sea …, 2021
252021
Quincy: Detecting host-based code injection attacks in memory dumps
T Barabosch, N Bergmann, A Dombeck, E Padilla
Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017
252017
Host-based code injection attacks: A popular technique used by malware
T Barabosch, E Gerhards-Padilla
2014 9th International Conference on Malicious and Unwanted Software: The …, 2014
242014
The system can't perform the operation now. Try again later.
Articles 1–20