A survey of visualization systems for malware analysis M Wagner, F Fischer, R Luh, A Haberson, A Rind, DA Keim, W Aigner Eurographics conference on visualization (EuroVis), 105-125, 2015 | 122 | 2015 |
Semantics-aware detection of targeted attacks: a survey R Luh, S Marschalek, M Kaiser, H Janicke, S Schrittwieser Journal of Computer Virology and Hacking Techniques 13 (1), 47-85, 2017 | 62 | 2017 |
The other side of the coin: A framework for detecting and analyzing web-based cryptocurrency mining campaigns J Rauchberger, S Schrittwieser, T Dam, R Luh, D Buhov, G Pötzelsberger, ... Proceedings of the 13th International Conference on Availability …, 2018 | 32 | 2018 |
Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis M Wagner, W Aigner, A Rind, H Dornhackl, K Kadletz, R Luh, P Tavolato Proceedings of the Eleventh Workshop on Visualization for Cyber Security, 9-16, 2014 | 31 | 2014 |
Malicious behavior patterns H Dornhackl, K Kadletz, R Luh, P Tavolato 2014 IEEE 8th international symposium on service oriented system engineering …, 2014 | 25 | 2014 |
PenQuest: a gamified attacker/defender meta model for cyber security assessment and education R Luh, M Temper, S Tjoa, S Schrittwieser, H Janicke Journal of Computer Virology and Hacking Techniques 16 (1), 19-61, 2020 | 15 | 2020 |
AIDIS: Detecting and classifying anomalous behavior in ubiquitous kernel processes R Luh, H Janicke, S Schrittwieser Computers & Security 84, 120-147, 2019 | 13 | 2019 |
The evolution of process hiding techniques in malware-current threats and possible countermeasures S Eresheim, R Luh, S Schrittwieser Journal of Information Processing 25, 866-874, 2017 | 13 | 2017 |
TAON: An ontology-based approach to mitigating targeted attacks R Luh, S Schrittwieser, S Marschalek Proceedings of the 18th International Conference on Information Integration …, 2016 | 12 | 2016 |
Classifying malicious system behavior using event propagation trees S Marschalek, R Luh, M Kaiser, S Schrittwieser Proceedings of the 17th International Conference on Information Integration …, 2015 | 11 | 2015 |
Design of an Anomaly-based Threat Detection & Explication System. R Luh, S Schrittwieser, S Marschalek, H Janicke, E Weippl ICISSP, 397-402, 2017 | 9 | 2017 |
Defining malicious behavior H Dornhackl, K Kadletz, R Luh, P Tavolato 2014 Ninth International Conference on Availability, Reliability and …, 2014 | 9 | 2014 |
LLR-based sentiment analysis for kernel event sequences R Luh, S Schrittwieser, S Marschalek 2017 IEEE 31st International Conference on Advanced Information Networking …, 2017 | 8 | 2017 |
SEQUIN: a grammar inference framework for analyzing malicious system behavior R Luh, G Schramm, M Wagner, H Janicke, S Schrittwieser Journal of Computer Virology and Hacking Techniques 14 (4), 291-311, 2018 | 7 | 2018 |
APT RPG: Design of a Gamified Attacker/Defender Meta Model. R Luh, M Temper, S Tjoa, S Schrittwieser ICISSP, 526-537, 2018 | 7 | 2018 |
Visual analytics: Foundations and experiences in malware analysis M Wagner, D Sacha, A Rind, F Fischer, R Luh, S Schrittwieser, DA Keim, ... Empirical Research for Software Security, 139-171, 2017 | 7 | 2017 |
Longkit-A Universal Framework for BIOS/UEFI Rootkits in System Management Mode. J Rauchberger, R Luh, S Schrittwieser ICISSP, 346-353, 2017 | 7 | 2017 |
Behavior-based malware recognition R Luh, P Tavolato Forschungsforum der österreichischen Fachhochschulen 278, 2012 | 7 | 2012 |
Sequitur-based Inference and Analysis Framework for Malicious System Behavior. R Luh, G Schramm, M Wagner, S Schrittwieser ICISSP, 632-643, 2017 | 6 | 2017 |
On the impact of kernel code vulnerabilities in iot devices S Eresheim, R Luh, S Schrittwieser 2017 International Conference on Software Security and Assurance (ICSSA), 1-5, 2017 | 4 | 2017 |