A survey of visualization systems for malware analysis M Wagner, F Fischer, R Luh, A Haberson, A Rind, DA Keim, W Aigner | 150 | 2015 |
Semantics-aware detection of targeted attacks: a survey R Luh, S Marschalek, M Kaiser, H Janicke, S Schrittwieser Journal of Computer Virology and Hacking Techniques 13, 47-85, 2017 | 79 | 2017 |
PenQuest: a gamified attacker/defender meta model for cyber security assessment and education R Luh, M Temper, S Tjoa, S Schrittwieser, H Janicke Journal of Computer Virology and Hacking Techniques 16, 19-61, 2020 | 48 | 2020 |
The other side of the coin: A framework for detecting and analyzing web-based cryptocurrency mining campaigns J Rauchberger, S Schrittwieser, T Dam, R Luh, D Buhov, G Pötzelsberger, ... Proceedings of the 13th International Conference on Availability …, 2018 | 42 | 2018 |
Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis M Wagner, W Aigner, A Rind, H Dornhackl, K Kadletz, R Luh, P Tavolato Proceedings of the Eleventh Workshop on Visualization for Cyber Security, 9-16, 2014 | 39 | 2014 |
Malicious behavior patterns H Dornhackl, K Kadletz, R Luh, P Tavolato 2014 IEEE 8th international symposium on service oriented system engineering …, 2014 | 29 | 2014 |
The evolution of process hiding techniques in malware-current threats and possible countermeasures S Eresheim, R Luh, S Schrittwieser Journal of Information Processing 25, 866-874, 2017 | 25 | 2017 |
TAON: An ontology-based approach to mitigating targeted attacks R Luh, S Schrittwieser, S Marschalek Proceedings of the 18th international conference on information integration …, 2016 | 25 | 2016 |
AIDIS: Detecting and classifying anomalous behavior in ubiquitous kernel processes R Luh, H Janicke, S Schrittwieser Computers & Security 84, 120-147, 2019 | 19 | 2019 |
" Offizielle" elektronische Version der Publikation (entsprechend ihrem Digital Object Identifier-DOI) R Radis, E Kozeschnik Materials Science Forum 636 (637), 605-611, 2010 | 15* | 2010 |
Time for truth: Forensic analysis of ntfs timestamps M Galhuber, R Luh Proceedings of the 16th International Conference on Availability …, 2021 | 14 | 2021 |
Longkit-A Universal Framework for BIOS/UEFI Rootkits in System Management Mode. J Rauchberger, R Luh, S Schrittwieser ICISSP, 346-353, 2017 | 13 | 2017 |
Classifying malicious system behavior using event propagation trees S Marschalek, R Luh, M Kaiser, S Schrittwieser Proceedings of the 17th International Conference on Information Integration …, 2015 | 12 | 2015 |
APT RPG: Design of a Gamified Attacker/Defender Meta Model. R Luh, M Temper, S Tjoa, S Schrittwieser ICISSP, 526-537, 2018 | 10 | 2018 |
Visual analytics: Foundations and experiences in malware analysis M Wagner, D Sacha, A Rind, F Fischer, R Luh, S Schrittwieser, DA Keim, ... Empirical research for software security, 139-171, 2017 | 10 | 2017 |
Design of an anomaly-based threat detection & explication system R Luh, S Schrittwieser, S Marschalek, H Janicke International Conference on Information Systems Security and Privacy 2, 397-402, 2017 | 10 | 2017 |
PenQuest reloaded: A digital cyber defense game for technical education R Luh, S Eresheim, S Größbacher, T Petelin, F Mayr, P Tavolato, ... 2022 IEEE Global Engineering Education Conference (EDUCON), 906-914, 2022 | 9 | 2022 |
SEQUIN: a grammar inference framework for analyzing malicious system behavior R Luh, G Schramm, M Wagner, H Janicke, S Schrittwieser Journal of Computer Virology and Hacking Techniques 14, 291-311, 2018 | 9 | 2018 |
Defining malicious behavior H Dornhackl, K Kadletz, R Luh, P Tavolato 2014 Ninth International Conference on Availability, Reliability and …, 2014 | 9 | 2014 |
LLR-based sentiment analysis for kernel event sequences R Luh, S Schrittwieser, S Marschalek 2017 IEEE 31st International Conference on Advanced Information Networking …, 2017 | 8 | 2017 |