Follow
Martin Brunner
Title
Cited by
Cited by
Year
Requirements for signaling protocols
M Brunner
1402004
Infiltrating critical infrastructures with next-generation attacks
M Brunner, H Hofinger, C Krauß, C Roblee, P Schoo, S Todt
Fraunhofer Institute for Secure Information Technology (SIT), Munich, 2010
352010
Infiltrating critical infrastructures with next-generation attacks w32. stuxnet as a showcase threat
M Brunner, H Hofinger, C Krauss, C Roblee, P Schoo, S Todt
Fraunhofer Research Institute AISEC 12, 2010, 2010
232010
Malcobox: Designing a 10 gb/s malware collection honeypot using reconfigurable technology
S Mühlbach, M Brunner, C Roblee, A Koch
2010 International Conference on Field Programmable Logic and Applications …, 2010
232010
Requirements for QoS signaling protocols
M Brunner
NSIS Working Group, IETF Draft, draft-ietf-nsis-req-02. txt,(work in progress), 2002
232002
Anonymity and privacy in distributed early warning systems
M Brunner, H Hofinger, C Roblee, P Schoo, S Todt
International Workshop on Critical Information Infrastructures Security, 81-92, 2010
162010
Policy Core Extension Lightweight Directory Access Protocol Schema (PCELS)
M Pana, A Reyes, A Barba, D Moron, M Brunner
62005
RFC3726: Requirements for Signaling Protocols
M Brunner
RFC Editor, 2004
62004
The fraunhofer aisec malware analysis laboratoryestablishing a secured, honeynet-based cyber threat analysis and research environment
M Brunner, M Epah, H Hofinger, C Roblee, P Schoo, S Todt
Technical report, Fraunhofer AISEC, 2010
42010
Integrated Honeypot Based Malware Collection and Analysis
M Brunner, M Fuchs, Christian, S Todt
Advances in IT Early Warning, 156, 2013
32013
Management architectures and approaches for Ambient Networks
J Nielsen, A Galis, H Abrahamsson, B Ahlgren, M Brunner, L Cheng, ...
Network 1, 3, 2004
32004
Awesome-automated web emulation for secure operation of a malware-analysis environment
M Brunner, CM Fuchs, S Todt
Proceedings of the Sixth International Conference on Emerging Security …, 2012
22012
Problems in web-based open source information processing for it early warning
K Grothoff, M Brunner, H Hofinger, C Roblee, C Eckert
Lawrence Livermore National Lab.(LLNL), Livermore, CA (United States), 2011
12011
The Fraunhofer SIT malware analysis laboratory-establishing a secured, honeynet-based cyber threat analysis and research environment
M Brunner, M Epah, H Hofinger, C Roblee, P Schoo, S Todt
Fraunhofer SIT, 2010
12010
Towards Next Generation Malware Collection and Analysis
CM Fuchs, M Brunner
International Journal on Advances in Security Volume 6, Number 1 & 2, 2013, 2013
2013
Forschungsansätze zur Effizienzsteigerung heutiger IT-Frühwarnsysteme
M Brunner, P Schoo, H Hofinger, C Roblee, S Todt
Datenschutz und Datensicherheit-DuD 35, 253-257, 2011
2011
Network Working Group M. Pana, Ed. Request for Comments: 4104 MetaSolv Updates: 3703 A. Reyes Category: Standards Track Computer Architecture, UPC
A Barba, D Moron, M Brunner
Policy, 2005
2005
RFC 4104: Policy Core Extension Lightweight Directory Access Protocol Schema (PCELS)
A Reyes, A Barba, D Moron, M Brunner
RFC Editor, 2005
2005
Best Paper Award
M Brunner, CM Fuchs, S Todt
The system can't perform the operation now. Try again later.
Articles 1–19