Search Results - "Freiling, F.C."

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Solving Consensus Using Structural Failure Models by Warns, T., Freiling, F.C., Hasselbring, W.

    “…Failure models characterise the expected component failures in fault-tolerant computing. In the context of distributed systems, a failure model usually…”
    Get full text
    Conference Proceeding
  2. 2

    Advanced Evasive Data Storage in Sensor Networks by Benenson, Z., Freiling, F.C., Cholewinski, P.M.

    “…In case the data which is stored and processed in a sensor network has some value, it needs to be protected from unauthorized access through a security…”
    Get full text
    Conference Proceeding
  3. 3

    The Forensic Image Generator Generator (Forensig2) by Moch, C., Freiling, F.C.

    “…We describe a system that allows to produce file system images for training courses in forensic computing. The instructor can ldquoprogramrdquo certain user…”
    Get full text
    Conference Proceeding
  4. 4

    Modular Consensus Algorithms for the Crash-Recovery Model by Freiling, F.C., Lambertz, C., Majster-Cederbaum, M.

    “…In the crash-recovery failure model of asynchronous distributed systems, processes can temporarily stop to execute steps and later restart their computation…”
    Get full text
    Conference Proceeding
  5. 5

    Message-efficient omission-tolerant consensus with limited synchrony by Delporte-Gallet, C., Fauconnier, H., Tielmann, A., Freiling, F.C., Kilic, M.

    “…We study the problem of consensus in the general omission failure model, i.e., in systems where processes can crash and omit messages while sending or…”
    Get full text
    Conference Proceeding
  6. 6

    On the Effort to Create Smartphone Worms in Windows Mobile by Becher, M., Freiling, F.C., Leider, B.

    “…Compared to what we know about malware for desktop and server systems, we know almost nothing about malware for smartphones and similar mobile devices. With…”
    Get full text
    Conference Proceeding
  7. 7

    Design and Implementation of the Honey-DVD by Dornseif, M., Freiling, F.C., Gedicke, N., Holz, T.

    “…Honeynets are a valuable source of data about techniques, tactics and motives of attackers in the Internet, but up to now they have been notoriously difficult…”
    Get full text
    Conference Proceeding
  8. 8

    Authenticated query flooding in sensor networks by Benenson, Z., Pimenidis, L., Hammerschmidt, E., Freiling, F.C., Lucks, S.

    “…We propose a novel mechanism for authentication of flooded queries in sensor networks. Each sensor can verify with certain probability that the query is sent…”
    Get full text
    Conference Proceeding