default search action
Jan Göbel
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c14]Pascal Siegers, Antonia May, Claudia Saalbach, Jana Nebelin, Dagmar Kern, Andreas Daniel, Benjamin Zapilko, Fakhri Momeni, Knut Wenzig, Jan Goebel:
Linked Open Research Data for Social Science A Concept Registry for Granular Data Documentation. CoRDI 2023 - 2020
- [j5]Felix Bensmann, Lars Heling, Stefan Jünger, Loren Mucha, Maribel Acosta, Jan Goebel, Gotthard Meinel, Sujit Kumar Sikder, York Sure-Vetter, Benjamin Zapilko:
An Infrastructure for Spatial Linking of Survey Data. Data Sci. J. 19: 27 (2020)
2010 – 2019
- 2019
- [c13]Michael Wurm, Matthias Weigand, Thomas Stark, Jan Goebel, Gert G. Wagner, Hannes Taubenböck:
Modelling the impact of the urban spatial structure on the choice of residential location using 'big earth data' and machine learning. JURSE 2019: 1-4 - 2018
- [j4]Jonas Beste, Markus M. Grabka, Jan Goebel:
Armut in Deutschland. AStA Wirtschafts und Sozialstatistisches Arch. 12(1): 27-62 (2018) - 2015
- [c12]Michael Wurm, Hannes Taubenböck, Jan Goebel, Gert G. Wagner:
At the edge of the city center. JURSE 2015: 1-4 - 2012
- [c11]Thomas Schreck, Stefan Berger, Jan Göbel:
BISSAM: Automatic Vulnerability Identification of Office Documents. DIMVA 2012: 204-213 - [c10]Markus Engelberth, Jan Göbel, Christian Schönbein, Felix C. Freiling:
PyBox - A Python Sandbox. Sicherheit 2012: 137-148 - 2011
- [b2]Jan Göbel, Andreas Dewald:
Client-Honeypots - Exploring Malicious Websites. Oldenbourg 2011, ISBN 978-3-486-70526-3, pp. I-XIX, 1-214 - [b1]Jan Gerrit Göbel:
Large-scale detection and measurement of malicious content. University of Mannheim, 2011, pp. 1-197 - [j3]Markus Engelberth, Felix C. Freiling, Jan Göbel, Christian Gorecki, Thorsten Holz, Ralf Hund, Philipp Trinius, Carsten Willems:
Das Internet-Malware-Analyse-System (InMAS) - Ein System zur großflächigen Sammlung und Analyse von Schadsoftware im Internet. Datenschutz und Datensicherheit 35(4): 247-252 (2011) - [c9]Alexander Knaus, Johannes Stüttgen, Jan Göbel, Markus Engelberth, Felix C. Freiling:
Säuberung eines infizierten Windows-Betriebssystems auf Basis von Malware-Analyse-Berichten. GI-Jahrestagung 2011: 114 - 2010
- [c8]Jan Göbel:
Amun: Automatic Capturing of Malicious Software. Sicherheit 2010: 177-190 - [c7]Jan Göbel, Philipp Trinius:
Towards Optimal Sensor Placement Strategies for Early Warning Systems. Sicherheit 2010: 191-204
2000 – 2009
- 2009
- [c6]Markus Engelberth, Jan Göbel, Christian Gorecki, Philipp Trinius:
Mail-Shake. DEXA Workshops 2009: 43-47 - [c5]Jan Göbel, Thorsten Holz, Philipp Trinius:
Towards Proactive Spam Filtering (Extended Abstract). DIMVA 2009: 38-47 - [c4]Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel, Engin Kirda:
Automatically Generating Models for Botnet Detection. ESORICS 2009: 232-249 - [c3]Philipp Trinius, Thorsten Holz, Jan Göbel, Felix C. Freiling:
Visual analysis of malware behavior using treemaps and thread graphs. VizSEC 2009: 33-38 - 2008
- [j2]Gert G. Wagner, Jan Göbel, Peter Krause, Rainer Pischner, Ingo Sieber:
Das Sozio-oekonomische Panel (SOEP): Multidisziplinäres Haushaltspanel und Kohortenstudie für Deutschland - Eine Einführung (für neue Datennutzer) mit einem Ausblick (für erfahrene Anwender). AStA Wirtschafts und Sozialstatistisches Arch. 2(4): 301-328 (2008) - 2007
- [c2]Jan Goebel, Thorsten Holz, Carsten Willems:
Measurement and Analysis of Autonomous Spreading Malware in a University Environment. DIMVA 2007: 109-128 - [c1]Jan Goebel, Thorsten Holz:
Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation. HotBots 2007 - [i1]Jan Goebel, Joachim Wackerow:
New Frontiers: Can Panel Studies Go DDI? First Experiences in documenting the German Socio-Economic Panel Study with DDI 3.0. IASSIST Conference 2007 - 2006
- [j1]Jan Göbel, Jens Hektor, Thorsten Holz:
Advanced Honeypot-Based Intrusion Detection. login Usenix Mag. 31(6) (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint