Prudent practices for designing malware experiments: Status quo and outlook C Rossow, CJ Dietrich, C Grier, C Kreibich, V Paxson, N Pohlmann, ... 2012 IEEE symposium on security and privacy, 65-79, 2012 | 325 | 2012 |
On botnets that use DNS for command and control CJ Dietrich, C Rossow, FC Freiling, H Bos, M Van Steen, N Pohlmann 2011 seventh european conference on computer network defense, 9-16, 2011 | 192 | 2011 |
CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis CJ Dietrich, C Rossow, N Pohlmann Computer Networks 57 (2), 475-486, 2013 | 138 | 2013 |
Sandnet: Network traffic analysis of malicious software C Rossow, CJ Dietrich, H Bos, L Cavallaro, M Van Steen, FC Freiling, ... Proceedings of the First Workshop on Building Analysis Datasets and …, 2011 | 137 | 2011 |
Cyber-Sicherheit N Pohlmann Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …, 2019 | 109 | 2019 |
Design rationale behind the identity metasystem architecture N Pohlmann, H Reimer, W Schneider, K Cameron, MB Jones Isse/secure 2007 Securing Electronic Business Processes: Highlights of the …, 2007 | 107 | 2007 |
Beyond the front page: Measuring third party dynamics in the field T Urban, M Degeling, T Holz, N Pohlmann Proceedings of the web conference 2020, 1275-1286, 2020 | 96 | 2020 |
Measuring the impact of the GDPR on data sharing in ad networks T Urban, D Tatang, M Degeling, T Holz, N Pohlmann Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 84 | 2020 |
A study on subject data access in online advertising after the GDPR T Urban, D Tatang, M Degeling, T Holz, N Pohlmann Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2019 | 82 | 2019 |
Threat modeling for mobile health systems M Cagnazzo, M Hertlein, T Holz, N Pohlmann 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW …, 2018 | 67 | 2018 |
Firewall-Systeme. Firewall-Elemente und Sicherheitskonzepte, Verschlüsselungs-und Authentikationsverfahren, Security Audit, Bedrohungsprofile, IT-Kostenschätzung N Pohlmann | 55* | 2003 |
European Multilateral Secure Computing Base. Open Trusted Computing for You and Me AR Sadeghi, C Stüble, N Pohlmann | 53 | 2004 |
Managing information security in small and medium sized enterprises: a holistic approach N Pohlmann, H Reimer, W Schneider, A Tawileh, J Hilton, S McIntosh ISSE/SECURE 2007 Securing Electronic Business Processes: Highlights of the …, 2007 | 50 | 2007 |
Dealing with Privacy Obligations in Enterprises. MC Mont ISSE, 198-208, 2004 | 39 | 2004 |
Reproducibility and replicability of web measurement studies N Demir, M Große-Kampmann, T Urban, C Wressnegger, T Holz, ... Proceedings of the ACM Web Conference 2022, 533-544, 2022 | 38 | 2022 |
Setting up an effective information security awareness programme N Pohlmann, H Reimer, W Schneider, D De Maeyer ISSE/SECURE 2007 Securing Electronic Business Processes: Highlights of the …, 2007 | 38 | 2007 |
The unwanted sharing economy: An analysis of cookie syncing and user transparency under GDPR T Urban, D Tatang, M Degeling, T Holz, N Pohlmann arXiv preprint arXiv:1811.08660, 2018 | 37 | 2018 |
SPEECH: Secure personal end-to-end communication with handheld S Paulus, N Pohlmann, H Reimer, A Castiglione, G Cattaneo, A De Santis, ... ISSE 2006—Securing Electronic Busines Processes: Highlights of the …, 2006 | 31 | 2006 |
Information assurance education in two-and four-year institutions LC Pérez, S Cooper, EK Hawthorne, S Wetzel, J Brynielsson, AG Gökce, ... Proceedings of the 16th annual conference reports on Innovation and …, 2011 | 30 | 2011 |
"Your hashed IP address: Ubuntu." perspectives on transparency tools for online advertising T Urban, M Degeling, T Holz, N Pohlmann Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 26 | 2019 |