Showing
1 - 5
results of
5
Skip to content
VuFind
Log in
Library Catalogue Plus
Library
Subject guides
Databases
Referencing
Catalogue
Articles Plus
Keyword
Title
Author
Subject
Find
Advanced Search
Search Results - Tatang, Dennis
Search Results - Tatang, Dennis
Showing
1 - 5
results of
5
Refine Results
Sort
Relevance
Date Descending
Author
Title
1
Loading…
Analyzing leakage of personal information by malware
by
Urban, Tobias
,
Tatang, Dennis
,
Holz, Thorsten
,
Pohlmann, Norbert
Published in
Journal of computer security
Get full text
Items that this one cites
Article
Save to List
Saved in:
2
Loading…
Below the Radar: Spotting DNS Tunnels in Newly Observed Hostnames in the Wild
by
Tatang, Dennis
,
Quinkert, Florian
,
Holz, Thorsten
Request full text
Conference Proceeding
Save to List
Saved in:
3
Loading…
The Unwanted Sharing Economy: An Analysis of Cookie Syncing and User Transparency under GDPR
by
Urban, Tobias
,
Tatang, Dennis
,
Degeling, Martin
,
Holz, Thorsten
,
Pohlmann, Norbert
Published in
arXiv.org
Get full text
Article
Save to List
Saved in:
4
Loading…
A Study of Newly Observed Hostnames and DNS Tunneling in the Wild
by
Tatang, Dennis
,
Quinkert, Florian
,
Dolecki, Nico
,
Holz, Thorsten
Published in
arXiv.org
Get full text
Article
Save to List
Saved in:
5
Loading…
An Empirical Study on Price Differentiation Based on System Fingerprints
by
Hupperich, Thomas
,
Tatang, Dennis
,
Wilkop, Nicolai
,
Holz, Thorsten
Published in
arXiv.org
Get full text
Article
Save to List
Saved in:
Search Tools:
RSS Feed
Email Search
Save Search
Back
Refine Results
Page will reload when a filter is selected or excluded.
Limit To
Peer Reviewed
1 results
1
Full Text
5 results
5
Format
Articles
4 results
4
Conference Proceedings
1 results
1
Journal Title
Arxiv.org
1 results
1
Journal Of Computer Security
1 results
1
Subjects
Ip
3 results
3
Computer Science
2 results
2
Computer Science, Information Systems
2 results
2
Data Analysis
2 results
2
Digital Media
2 results
2
Domain Names
2 results
2
Empirical Analysis
2 results
2
Phishing
2 results
2
Science & Technology
2 results
2
Security Systems
2 results
2
Technology
2 results
2
Adware
1 results
1
Computer Science - Cryptography And Security
1 results
1
Computer Science, Interdisciplinary Applications
1 results
1
Computer Science, Theory & Methods
1 results
1
Crime
1 results
1
Criminology & Penology
1 results
1
Data Leakage
1 results
1
Data Transfer
1 results
1
Differentiation
1 results
1
Year of Publication
From:
To:
Source
Open Access: Freely Accessible Journals By Multiple Vendors
3 results
3
Road: Directory Of Open Access Scholarly Resources
3 results
3
Proquest - Publicly Available Content Database
3 results
3
Ieee Electronic Library (Iel) Conference Proceedings
1 results
1
Business Source Ultimate
1 results
1
Ieee Xplore All Conference Series
1 results
1