Maximillian Dornseif

According to our database1, Maximillian Dornseif authored at least 14 papers between 2002 and 2007.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2007
Testing Forensic Hash Tools on Sparse Files.
Proceedings of the IT-Incidents Management & IT-Forensics, 2007

2006
Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks.
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006

Tampering with Motes: Real-World Attacks on Wireless Sensor Networks.
Proceedings of the Sicherheit 2006: Sicherheit, 2006

The Nepenthes Platform: An Efficient Approach to Collect Malware.
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006

A Comparative Study of Teaching Forensics at a University Degree Level.
Proceedings of the IT-Incidents Management & IT-Forensics, 2006

2005
Honeypots and Limitations of Deception.
Proceedings of the "Heute schon das Morgen sehen", 2005

2004
Vulnerability Assessment using Honeypots.
Prax. Inf.verarb. Kommun., 2004

Ermittlung von Verwundbarkeiten mit elektronischen Koedern
CoRR, 2004

Modelling the costs and benefits of Honeynets
CoRR, 2004

NoSEBrEaK - Attacking Honeynets
CoRR, 2004

Ermittlung von Verwundbarkeiten mit elektronischen Ködern.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2004

2003
Government mandated blocking of foreign Web content.
Proceedings of the Security, 2003

2002
Tatsächliche und rechtliche Risiken drahtloser Computernetzwerke.
Datenschutz und Datensicherheit, 2002

Factual and Legal Risks regarding wireless Computer Networks
CoRR, 2002


  Loading...