Author of the publication

This Network is Infected : HosTaGe - a Low-Interaction Honeypot for Mobile Devices

, , , , , , and . Security and Privacy in Smartphones & Mobile Devices, page 43--48. (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Poster: Challenges of Accurately Measuring Churn in P2P Botnets., , , , and . ACM Conference on Computer and Communications Security, page 2661-2663. ACM, (2019)On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection., , , , and . ACM Trans. Priv. Secur., 24 (2): 8:1-8:39 (2021)A decentralized honeypot for IoT Protocols based on Android devices., , , , and . Int. J. Inf. Sec., 21 (6): 1211-1222 (2022)HosTaGe: a Mobile Honeypot for Collaborative Defense, , , and . International Conference on Security of Information and Networks, (2014)Autonomously detecting sensors in fully distributed botnets., , , and . Comput. Secur., (2019)An uneven game of hide and seek: Hiding botnet CnC by encrypting IPs in DNS records., , , and . CNS, page 164-172. IEEE, (2021)Interaction matters: a comprehensive analysis and a dataset of hybrid IoT/OT honeypots., , and . ACSAC, page 742-755. ACM, (2022)TRIDEnT: Building Decentralized Incentives for Collaborative Security., , , , and . CoRR, (2019)A honeypot-driven cyber incident monitor: lessons learned and steps ahead, , , and . International Conference on Security of Information and Networks, (2015)Detection and mitigation of monitor identification attacks in collaborative intrusion detection systems., and . Int. J. Netw. Manag., (2019)