Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Correction to: A decentralized honeypot for IoT Protocols based on Android devices., , , , and . Int. J. Inf. Sec., 22 (1): 303 (2023)SweetCam: an IP Camera Honeypot., , and . CPSIOTSEC@CCS, page 75-81. ACM, (2023)A Bad IDEa: Weaponizing uncontrolled online-IDEs in availability attacks., , , and . EuroS&P Workshops, page 82-92. IEEE, (2022)Honeysweeper: Towards Stealthy Honeytoken Fingerprinting Techniques., , , , , and . NordSec, volume 13700 of Lecture Notes in Computer Science, page 101-119. Springer, (2022)Open for hire: attack trends and misconfiguration pitfalls of IoT devices., , and . Internet Measurement Conference, page 195-215. ACM, (2021)Deceptive directories and "vulnerable" logs: a honeypot study of the LDAP and log4j attack landscape., , and . EuroS&P Workshops, page 442-447. IEEE, (2022)An Analysis of War Impact on Ukrainian Critical Infrastructure Through Network Measurements., , , , , and . TMA, page 1-10. IEEE, (2023)Towards systematic honeytoken fingerprinting., , and . SIN, page 28:1-28:5. ACM, (2020)A decentralized honeypot for IoT Protocols based on Android devices., , , , and . Int. J. Inf. Sec., 21 (6): 1211-1222 (2022)Interaction matters: a comprehensive analysis and a dataset of hybrid IoT/OT honeypots., , and . ACSAC, page 742-755. ACM, (2022)