Author of the publication

HosTaGe: a Mobile Honeypot for Collaborative Defense

, , , and . International Conference on Security of Information and Networks, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hide And Seek: Detecting Sensors In P2P Botnets, , , , and . IEEE Conference on Communications and Network Security, page 731--732. (2015)HosTaGe: a Mobile Honeypot for Collaborative Defense, , , and . International Conference on Security of Information and Networks, (2014)BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets, , , , and . IEEE International Conference on Communications (ICC),, (2016)This Network is Infected : HosTaGe - a Low-Interaction Honeypot for Mobile Devices, , , , , , and . Security and Privacy in Smartphones & Mobile Devices, page 43--48. (2013)MundoMessage: enabling trustworthy ubiquitous emergency communication, , , and . Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, page 29:1--29:10. New York, NY, USA, ACM, (2011)An Unusual CS 1 with High Standards and Confirming Results, and . Proceedings of the fifteenth annual conference on Innovation and technology in computer science education, page 169--173. New York, NY, ACM, (2010)On Advanced Monitoring in Resilient and Unstructured P2P Botnets, , , and . IEEE International Conference on Communications (ICC), (2014)A honeypot-driven cyber incident monitor: lessons learned and steps ahead, , , and . International Conference on Security of Information and Networks, (2015)”I Don’t Know How to Protect Myself”: Understanding Privacy Perceptions Resulting from the Presence of Bystanders in Smart Environments, , , , , and . Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society, New York, NY, USA, Association for Computing Machinery, (2020)Taxonomy and Survey of Collaborative Intrusion Detection, , , and . ACM Computing Surveys, (2015)