Author of the publication

A honeypot-driven cyber incident monitor: lessons learned and steps ahead

, , , and . International Conference on Security of Information and Networks, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets, , , , and . IEEE International Conference on Communications (ICC),, (2016)This Network is Infected : HosTaGe - a Low-Interaction Honeypot for Mobile Devices, , , , , , and . Security and Privacy in Smartphones & Mobile Devices, page 43--48. (2013)An Unusual CS 1 with High Standards and Confirming Results, and . Proceedings of the fifteenth annual conference on Innovation and technology in computer science education, page 169--173. New York, NY, ACM, (2010)MundoMessage: enabling trustworthy ubiquitous emergency communication, , , and . Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, page 29:1--29:10. New York, NY, USA, ACM, (2011)On Advanced Monitoring in Resilient and Unstructured P2P Botnets, , , and . IEEE International Conference on Communications (ICC), (2014)A honeypot-driven cyber incident monitor: lessons learned and steps ahead, , , and . International Conference on Security of Information and Networks, (2015)”I Don’t Know How to Protect Myself”: Understanding Privacy Perceptions Resulting from the Presence of Bystanders in Smart Environments, , , , , and . Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society, New York, NY, USA, Association for Computing Machinery, (2020)Taxonomy and Survey of Collaborative Intrusion Detection, , , and . ACM Computing Surveys, (2015)ZeusMilker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism, , , , and . IEEE International Conference on Distributed Computing Systems (ICDCS), (2015)On the Resilience of P2P-based Botnet Graphs, , , , and . IEEE Conference on Communications and Network Security (CNS), (2016)