Robert Luh

Orcid: 0000-0001-6536-6706

According to our database1, Robert Luh authored at least 32 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

2023
A Game Theoretic Analysis of Cyber Threats.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

2022
Timestamp Patterns in Windows Forensics.
ERCIM News, 2022

PenQuest: Gamifying Cyberattacks.
ERCIM News, 2022

Formalizing Real-world Threat Scenarios.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

PenQuest Reloaded: A Digital Cyber Defense Game for Technical Education.
Proceedings of the IEEE Global Engineering Education Conference, 2022

WSL2 Forensics: Detection, Analysis & Revirtualization.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Time for Truth: Forensic Analysis of NTFS Timestamps.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
PenQuest: a gamified attacker/defender meta model for cyber security assessment and education.
J. Comput. Virol. Hacking Tech., 2020

Advanced threat intelligence: detection and classification of anomalous behavior in system processes.
Elektrotech. Informationstechnik, 2020

2019
Advanced threat intelligence: interpretation of anomalous behavior in ubiquitous kernel processes.
PhD thesis, 2019

AIDIS: Detecting and classifying anomalous behavior in ubiquitous kernel processes.
Comput. Secur., 2019

2018
SEQUIN: a grammar inference framework for analyzing malicious system behavior.
J. Comput. Virol. Hacking Tech., 2018

APT RPG: Design of a Gamified Attacker/Defender Meta Model.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Semantics-aware detection of targeted attacks: a survey.
J. Comput. Virol. Hacking Tech., 2017

The Evolution of Process Hiding Techniques in Malware - Current Threats and Possible Countermeasures.
J. Inf. Process., 2017

Poster: Design of an Anomaly-based Threat Detection & Explication System.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Endpoint Data Classification Using Markov Chains.
Proceedings of the International Conference on Software Security and Assurance, 2017

On the Impact of Kernel Code Vulnerabilities in IoT Devices.
Proceedings of the International Conference on Software Security and Assurance, 2017

Longkit - A Universal Framework for BIOS/UEFI Rootkits in System Management Mode.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Design of an Anomaly-based Threat Detection & Explication System.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Sequitur-based Inference and Analysis Framework for Malicious System Behavior.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

A Bigram Supported Generic Knowledge-Assisted Malware Analysis System: BiG2-KAMAS.
Proceedings of the 10th Forum Media Technology and 3rd All Around Audio Symposium, 2017

LLR-Based Sentiment Analysis for Kernel Event Sequences.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
Empirical Malware Research through Observation of System Behaviour.
Proceedings of the 25th International Conference on World Wide Web, 2016

TAON: an ontology-based approach to mitigating targeted attacks.
Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, 2016

2015
A Survey of Visualization Systems for Malware Analysis.
Proceedings of the 17th Eurographics Conference on Visualization, 2015

Classifying malicious system behavior using event propagation trees.
Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services, 2015

2014
Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis.
Proceedings of the 11th Workshop on Visualization for Cyber Security, 2014

Malicious Behavior Patterns.
Proceedings of the 8th IEEE International Symposium on Service Oriented System Engineering, 2014

Defining Malicious Behavior.
Proceedings of the Ninth International Conference on Availability, 2014


  Loading...