Author of the publication

BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets

, , , , and . IEEE International Conference on Communications (ICC),, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets, , , , and . IEEE International Conference on Communications (ICC),, (2016)This Network is Infected : HosTaGe - a Low-Interaction Honeypot for Mobile Devices, , , , , , and . Security and Privacy in Smartphones & Mobile Devices, page 43--48. (2013)An Unusual CS 1 with High Standards and Confirming Results, and . Proceedings of the fifteenth annual conference on Innovation and technology in computer science education, page 169--173. New York, NY, ACM, (2010)MundoMessage: enabling trustworthy ubiquitous emergency communication, , , and . Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, page 29:1--29:10. New York, NY, USA, ACM, (2011)”I Don’t Know How to Protect Myself”: Understanding Privacy Perceptions Resulting from the Presence of Bystanders in Smart Environments, , , , , and . Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society, New York, NY, USA, Association for Computing Machinery, (2020)On Advanced Monitoring in Resilient and Unstructured P2P Botnets, , , and . IEEE International Conference on Communications (ICC), (2014)A honeypot-driven cyber incident monitor: lessons learned and steps ahead, , , and . International Conference on Security of Information and Networks, (2015)Noisemap: multi-tier incentive mechanisms for participative urban sensing, , , , and . Proceedings of the Third International Workshop on Sensing Applications on Mobile Phones, page 9:1--9:5. New York, NY, USA, ACM, (2012)ZeusMilker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism, , , , and . IEEE International Conference on Distributed Computing Systems (ICDCS), (2015)On the Resilience of P2P-based Botnet Graphs, , , , and . IEEE Conference on Communications and Network Security (CNS), (2016)