Search for persons
X
?
2023 IEEE Symposium on Security and Privacy (SP) ,
1
Could you clean up the Internet with a Pit of Tar? Investig..:
, In:
?
2022 IFIP Networking Conference (IFIP Networking) ,
2
Clustering Payloads: Grouping Randomized Scan Probes Into C..:
, In:
?
2022 IEEE Conference on Communications and Network Security (CNS) ,
3
Adding Zero Trust in BYOD Environments through Network Insp..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
4
Scan, Test, Execute: Adversarial Tactics in Amplification D..:
, In:
?
Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security ,
5
Analysis and Takeover of the Bitcoin-Coordinated Pony Malwa..:
, In:
?
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security ,
8
Examining Mirai's Battle over the Internet of Things:
, In:
?
2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) ,
9
From Hodl to Heist: Analysis of Cyber Security Threats to B..:
, In:
?
Proceedings of the 15th International Conference on Availability, Reliability and Security ,
10
Quantifying autonomous system IP churn using attack traffic..:
, In:
?
NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium ,
11
Discovering Collaboration: Unveiling Slow, Distributed Scan..:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
12
Quality Evaluation of Cyber Threat Intelligence Feeds:
, In:
?
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Security and Privacy in Communication Networks ,
15