Robust and Effective Malware Detection Through Quantitative Data Flow Graph Metrics T Wüchner, M Ochoa, A Pretschner Detection of Intrusions and Malware, and Vulnerability Assessment, 98-118, 2015 | 87 | 2015 |
Leveraging compression-based graph mining for behavior-based malware detection T Wüchner, A Cisłak, M Ochoa, A Pretschner IEEE Transactions on Dependable and Secure Computing 16 (1), 99-112, 2017 | 83 | 2017 |
Data loss prevention based on data-driven usage control T Wüchner, A Pretschner 2012 IEEE 23rd International Symposium on Software Reliability Engineering …, 2012 | 82 | 2012 |
Malware detection with quantitative data flow graphs T Wüchner, M Ochoa, A Pretschner Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 77 | 2014 |
A framework for empirical evaluation of malware detection resilience against behavior obfuscation S Banescu, T Wuchner, A Salem, M Guggenmos, M Ochoa, A Pretschner 2015 10th international conference on malicious and unwanted software …, 2015 | 27 | 2015 |
Davast: Data-centric system level activity visualization T Wüchner, A Pretschner, M Ochoa Proceedings of the Eleventh Workshop on Visualization for Cyber Security, 25-32, 2014 | 22 | 2014 |
Compliance-preserving cloud storage federation based on data-driven usage control T Wüchner, S Müller, R Fischer 2013 IEEE 5th International Conference on Cloud Computing Technology and …, 2013 | 17 | 2013 |
State of online privacy: A technical perspective F Kelbert, F Shirazi, H Simo, T Wüchner, J Buchmann, A Pretschner, ... Internet Privacy: Eine multidisziplinäre Bestandsaufnahme/A …, 2012 | 12 | 2012 |
Q-floid: Android malware detection with quantitative data flow graphs JH Castellanos, T Wüchner, M Ochoa, S Rueda Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 13-25, 2016 | 8 | 2016 |
MalFlow: identification of C&C servers through host-based data flow profiling T Wüchner, M Ochoa, M Golagha, G Srivastava, T Schreck, A Pretschner Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2087-2094, 2016 | 7 | 2016 |
The disability-simulator: simulating the influences of disabilities on the usability of graphical user interfaces K Breiner, T Wüchner, M Brunnlieb Ergonomics and Health Aspects of Work with Computers: International …, 2011 | 5 | 2011 |
Generating behavior-based malware detection models with genetic programming T Wüchner, M Ochoa, E Lovat, A Pretschner 2016 14th Annual Conference on Privacy, Security and Trust (PST), 506-511, 2016 | 4 | 2016 |
FEEBO: an empirical evaluation framework for malware behavior obfuscation S Banescu, T Wüchner, M Guggenmos, M Ochoa, A Pretschner arXiv preprint arXiv:1502.03245, 2015 | 4 | 2015 |
Behavior-based Malware detection with quantitative data flow analysis T Wüchner Technische Universität München, 2016 | 3 | 2016 |
DAVAST T Wüchner, A Pretschner, M Ochoa Proceedings of the Eleventh Workshop on Visualization for Cyber Security, 2014 | | 2014 |