Robert Luh
Title
Cited by
Cited by
Year
A survey of visualization systems for malware analysis
M Wagner, F Fischer, R Luh, A Haberson, A Rind, DA Keim, W Aigner
Eurographics Conference on Visualization (EuroVis), 105-125, 2015
892015
Semantics-aware detection of targeted attacks: a survey
R Luh, S Marschalek, M Kaiser, H Janicke, S Schrittwieser
Journal of Computer Virology and Hacking Techniques 13 (1), 47-85, 2017
412017
Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis
M Wagner, W Aigner, A Rind, H Dornhackl, K Kadletz, R Luh, P Tavolato
Proceedings of the Eleventh Workshop on Visualization for Cyber Security, 9-16, 2014
302014
Malicious behavior patterns
H Dornhackl, K Kadletz, R Luh, P Tavolato
2014 IEEE 8th international symposium on service oriented system engineering …, 2014
252014
The other side of the coin: A framework for detecting and analyzing web-based cryptocurrency mining campaigns
J Rauchberger, S Schrittwieser, T Dam, R Luh, D Buhov, G Pötzelsberger, ...
Proceedings of the 13th International Conference on Availability …, 2018
242018
TAON: An ontology-based approach to mitigating targeted attacks
R Luh, S Schrittwieser, S Marschalek
Proceedings of the 18th International Conference on Information Integration …, 2016
132016
Design of an Anomaly-based Threat Detection & Explication System.
R Luh, S Schrittwieser, S Marschalek, H Janicke, E Weippl
ICISSP, 397-402, 2017
102017
The evolution of process hiding techniques in malware-current threats and possible countermeasures
S Eresheim, R Luh, S Schrittwieser
Journal of Information Processing 25, 866-874, 2017
102017
Classifying malicious system behavior using event propagation trees
S Marschalek, R Luh, M Kaiser, S Schrittwieser
Proceedings of the 17th International Conference on Information Integration …, 2015
102015
Defining malicious behavior
H Dornhackl, K Kadletz, R Luh, P Tavolato
2014 Ninth International Conference on Availability, Reliability and …, 2014
92014
PenQuest: a gamified attacker/defender meta model for cyber security assessment and education
R Luh, M Temper, S Tjoa, S Schrittwieser, H Janicke
Journal of Computer Virology and Hacking Techniques 16 (1), 19-61, 2020
82020
AIDIS: Detecting and classifying anomalous behavior in ubiquitous kernel processes
R Luh, H Janicke, S Schrittwieser
Computers & Security 84, 120-147, 2019
82019
LLR-based sentiment analysis for kernel event sequences
R Luh, S Schrittwieser, S Marschalek
2017 IEEE 31st International Conference on Advanced Information Networking …, 2017
72017
Behavior-based malware recognition
R Luh, P Tavolato
Forschungsforum der österreichischen Fachhochschulen 278, 2012
72012
Visual analytics: Foundations and experiences in malware analysis
M Wagner, D Sacha, A Rind, F Fischer, R Luh, S Schrittwieser, DA Keim, ...
62018
Sequitur-based Inference and Analysis Framework for Malicious System Behavior.
R Luh, G Schramm, M Wagner, S Schrittwieser
ICISSP, 632-643, 2017
62017
SEQUIN: a grammar inference framework for analyzing malicious system behavior
R Luh, G Schramm, M Wagner, H Janicke, S Schrittwieser
Journal of Computer Virology and Hacking Techniques 14 (4), 291-311, 2018
52018
APT RPG: Design of a Gamified Attacker/Defender Meta Model.
R Luh, M Temper, S Tjoa, S Schrittwieser
ICISSP, 526-537, 2018
52018
Longkit-A Universal Framework for BIOS/UEFI Rootkits in System Management Mode.
J Rauchberger, R Luh, S Schrittwieser
ICISSP, 346-353, 2017
32017
On the impact of kernel code vulnerabilities in iot devices
S Eresheim, R Luh, S Schrittwieser
2017 International Conference on Software Security and Assurance (ICSSA), 1-5, 2017
22017
The system can't perform the operation now. Try again later.
Articles 1–20