Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A honeypot-driven cyber incident monitor: lessons learned and steps ahead, , , and . International Conference on Security of Information and Networks, (2015)A qualitative mapping of Darkweb marketplaces., , , and . eCrime, page 1-15. IEEE, (2021)TRIDEnT: Building Decentralized Incentives for Collaborative Security., , , , and . CoRR, (2019)Open for hire: attack trends and misconfiguration pitfalls of IoT devices., , and . Internet Measurement Conference, page 195-215. ACM, (2021)Detecting DNS hijacking by using NetFlow data., , and . CNS, page 273-280. IEEE, (2022)Assessing the Threat of Blockchain-based Botnets., , , , and . eCrime, page 1-11. IEEE, (2019)Taxonomy and Survey of Collaborative Intrusion Detection, , , and . ACM Computing Surveys, (2015)Towards systematic honeytoken fingerprinting., , and . SIN, page 28:1-28:5. ACM, (2020)A Study on the Use of 3rd Party DNS Resolvers for Malware Filtering or Censorship Circumvention., , and . SEC, volume 648 of IFIP Advances in Information and Communication Technology, page 109-125. Springer, (2022)Tick Tock Break the Clock: Breaking CAPTCHAs on the Darkweb., , , , , , , and . SECRYPT, page 357-365. SCITEPRESS, (2022)