Follow
Robert Luh
Title
Cited by
Cited by
Year
A survey of visualization systems for malware analysis
M Wagner, F Fischer, R Luh, A Haberson, A Rind, DA Keim, W Aigner
1472015
Semantics-aware detection of targeted attacks: a survey
R Luh, S Marschalek, M Kaiser, H Janicke, S Schrittwieser
Journal of Computer Virology and Hacking Techniques 13, 47-85, 2017
792017
Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis
M Wagner, W Aigner, A Rind, H Dornhackl, K Kadletz, R Luh, P Tavolato
Proceedings of the Eleventh Workshop on Visualization for Cyber Security, 9-16, 2014
392014
PenQuest: a gamified attacker/defender meta model for cyber security assessment and education
R Luh, M Temper, S Tjoa, S Schrittwieser, H Janicke
Journal of Computer Virology and Hacking Techniques 16, 19-61, 2020
372020
The other side of the coin: A framework for detecting and analyzing web-based cryptocurrency mining campaigns
J Rauchberger, S Schrittwieser, T Dam, R Luh, D Buhov, G Pötzelsberger, ...
Proceedings of the 13th International Conference on Availability …, 2018
372018
Malicious behavior patterns
H Dornhackl, K Kadletz, R Luh, P Tavolato
2014 IEEE 8th international symposium on service oriented system engineering …, 2014
292014
The evolution of process hiding techniques in malware-current threats and possible countermeasures
S Eresheim, R Luh, S Schrittwieser
Journal of Information Processing 25, 866-874, 2017
222017
TAON: An ontology-based approach to mitigating targeted attacks
R Luh, S Schrittwieser, S Marschalek
Proceedings of the 18th International Conference on Information Integration …, 2016
202016
AIDIS: Detecting and classifying anomalous behavior in ubiquitous kernel processes
R Luh, H Janicke, S Schrittwieser
Computers & Security 84, 120-147, 2019
192019
" Offizielle" elektronische Version der Publikation (entsprechend ihrem Digital Object Identifier-DOI)
R Radis, E Kozeschnik
Materials Science Forum 636 (637), 605-611, 2010
14*2010
Longkit-A Universal Framework for BIOS/UEFI Rootkits in System Management Mode.
J Rauchberger, R Luh, S Schrittwieser
ICISSP, 346-353, 2017
122017
Classifying malicious system behavior using event propagation trees
S Marschalek, R Luh, M Kaiser, S Schrittwieser
Proceedings of the 17th International Conference on Information Integration …, 2015
112015
Design of an anomaly-based threat detection & explication system
R Luh, S Schrittwieser, S Marschalek, H Janicke
International Conference on Information Systems Security and Privacy 2, 397-402, 2017
102017
SEQUIN: a grammar inference framework for analyzing malicious system behavior
R Luh, G Schramm, M Wagner, H Janicke, S Schrittwieser
Journal of Computer Virology and Hacking Techniques 14, 291-311, 2018
92018
APT RPG: Design of a Gamified Attacker/Defender Meta Model.
R Luh, M Temper, S Tjoa, S Schrittwieser
ICISSP, 526-537, 2018
92018
Visual analytics: Foundations and experiences in malware analysis
M Wagner, D Sacha, A Rind, F Fischer, R Luh, S Schrittwieser, DA Keim, ...
Empirical Research for Software Security, 139-171, 2017
92017
Defining malicious behavior
H Dornhackl, K Kadletz, R Luh, P Tavolato
2014 Ninth International Conference on Availability, Reliability and …, 2014
92014
PenQuest reloaded: A digital cyber defense game for technical education
R Luh, S Eresheim, S Größbacher, T Petelin, F Mayr, P Tavolato, ...
2022 IEEE Global Engineering Education Conference (EDUCON), 906-914, 2022
82022
Time for truth: Forensic analysis of ntfs timestamps
M Galhuber, R Luh
Proceedings of the 16th International Conference on Availability …, 2021
82021
LLR-based sentiment analysis for kernel event sequences
R Luh, S Schrittwieser, S Marschalek
2017 IEEE 31st International Conference on Advanced Information Networking …, 2017
82017
The system can't perform the operation now. Try again later.
Articles 1–20