Author of the publication

Exposed Infrastructures: Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices.

, , , , , and . SP, page 2379-2396. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Easier Said Than Done: The Failure of Top-Level Cybersecurity Advice for Consumer IoT Devices., , , and . CoRR, (2023)Lessons in Prevention and Cure: A User Study of Recovery from Flubot Smartphone Malware., , , and . EuroUSEC, page 126-142. ACM, (2023)MalPaCA: Malware Packet Sequence Clustering and Analysis., , , and . CoRR, (2019)Block and Roll: A Metric-based Evaluation of Reputation Block Lists., , and . APWG.EU Tech, volume 3631 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)IoT Market Dynamics: An Analysis of Device Sales, Security and Privacy Signals, and their Interactions., , , and . USENIX Security Symposium, USENIX Association, (2024)Beneath the radar: Exploring the economics of business fraud via underground markets., , and . eCrime, page 1-14. IEEE, (2020)Intercept and Inject: DNS Response Manipulation in the Wild., , , , , , , , and . PAM, volume 13882 of Lecture Notes in Computer Science, page 461-478. Springer, (2023)Helping hands: Measuring the impact of a large threat intelligence sharing community., , , , , , , , and . USENIX Security Symposium, page 1149-1165. USENIX Association, (2022)Don't Get Hijacked: Prevalence, Mitigation, and Impact of Non-Secure DNS Dynamic Updates., , , , , and . CoRR, (2024)Pay the Piper: DDoS Mitigation Technique to Deter Financially-Motivated Attackers., , , , and . IEICE Trans. Commun., 103-B (4): 389-404 (2020)