A survey of visualization systems for malware analysis M Wagner, F Fischer, R Luh, A Haberson, A Rind, DA Keim, W Aigner | 155 | 2015 |
Semantics-aware detection of targeted attacks: a survey R Luh, S Marschalek, M Kaiser, H Janicke, S Schrittwieser Journal of Computer Virology and Hacking Techniques 13, 47-85, 2017 | 79 | 2017 |
PenQuest: a gamified attacker/defender meta model for cyber security assessment and education R Luh, M Temper, S Tjoa, S Schrittwieser, H Janicke Journal of Computer Virology and Hacking Techniques 16, 19-61, 2020 | 54 | 2020 |
Mean-field model for the growth and coarsening of stoichiometric precipitates at grain boundaries E Kozeschnik, J Svoboda, R Radis, FD Fischer Modelling and simulation in materials science and engineering 18 (1), 015011, 2009 | 48 | 2009 |
The other side of the coin: A framework for detecting and analyzing web-based cryptocurrency mining campaigns J Rauchberger, S Schrittwieser, T Dam, R Luh, D Buhov, G Pötzelsberger, ... Proceedings of the 13th International Conference on Availability …, 2018 | 44 | 2018 |
Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis M Wagner, W Aigner, A Rind, H Dornhackl, K Kadletz, R Luh, P Tavolato Proceedings of the Eleventh Workshop on Visualization for Cyber Security, 9-16, 2014 | 39 | 2014 |
Malicious behavior patterns H Dornhackl, K Kadletz, R Luh, P Tavolato 2014 IEEE 8th international symposium on service oriented system engineering …, 2014 | 30 | 2014 |
The evolution of process hiding techniques in malware-current threats and possible countermeasures S Eresheim, R Luh, S Schrittwieser Journal of Information Processing 25, 866-874, 2017 | 28 | 2017 |
TAON: An ontology-based approach to mitigating targeted attacks R Luh, S Schrittwieser, S Marschalek Proceedings of the 18th international conference on information integration …, 2016 | 25 | 2016 |
AIDIS: Detecting and classifying anomalous behavior in ubiquitous kernel processes R Luh, H Janicke, S Schrittwieser Computers & Security 84, 120-147, 2019 | 20 | 2019 |
Time for truth: Forensic analysis of ntfs timestamps M Galhuber, R Luh Proceedings of the 16th International Conference on Availability …, 2021 | 18 | 2021 |
PenQuest reloaded: A digital cyber defense game for technical education R Luh, S Eresheim, S Größbacher, T Petelin, F Mayr, P Tavolato, ... 2022 IEEE Global Engineering Education Conference (EDUCON), 906-914, 2022 | 16 | 2022 |
Longkit-A Universal Framework for BIOS/UEFI Rootkits in System Management Mode. J Rauchberger, R Luh, S Schrittwieser ICISSP, 346-353, 2017 | 13 | 2017 |
Classifying malicious system behavior using event propagation trees S Marschalek, R Luh, M Kaiser, S Schrittwieser Proceedings of the 17th International Conference on Information Integration …, 2015 | 12 | 2015 |
Design of an anomaly-based threat detection & explication system R Luh, S Schrittwieser, S Marschalek, H Janicke International Conference on Information Systems Security and Privacy 2, 397-402, 2017 | 11 | 2017 |
APT RPG: Design of a Gamified Attacker/Defender Meta Model. R Luh, M Temper, S Tjoa, S Schrittwieser ICISSP, 526-537, 2018 | 10 | 2018 |
Visual analytics: Foundations and experiences in malware analysis M Wagner, D Sacha, A Rind, F Fischer, R Luh, S Schrittwieser, DA Keim, ... Empirical research for software security, 139-171, 2017 | 10 | 2017 |
SEQUIN: a grammar inference framework for analyzing malicious system behavior R Luh, G Schramm, M Wagner, H Janicke, S Schrittwieser Journal of Computer Virology and Hacking Techniques 14, 291-311, 2018 | 9 | 2018 |
Defining malicious behavior H Dornhackl, K Kadletz, R Luh, P Tavolato 2014 Ninth International Conference on Availability, Reliability and …, 2014 | 9 | 2014 |
LLR-based sentiment analysis for kernel event sequences R Luh, S Schrittwieser, S Marschalek 2017 IEEE 31st International Conference on Advanced Information Networking …, 2017 | 8 | 2017 |