Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Disposable botnets: examining the anatomy of IoT botnet infrastructure., , , , , , , and . ARES, page 7:1-7:10. ACM, (2020)Certificate status information distribution and validation in vehicular networks.. Polytechnic University of Catalonia, Spain, (2013)Alert Alchemy: SOC Workflows and Decisions in the Management of NIDS Rules., , , , and . CCS, page 2770-2784. ACM, (2023)NURSE: eNd-UseR IoT malware detection tool for Smart homEs., and . IOT, page 134-142. ACM, (2021)Two Sides of the Shield: Understanding Protective DNS adoption factors., , , , and . USENIX Security Symposium, page 3135-3152. USENIX Association, (2023)Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware., , , , and . EuroS&P, page 392-409. IEEE, (2022)SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations., , , , , , , , and . EuroS&P, page 440-456. IEEE, (2021)Ruling the Rules: Quantifying the Evolution of Rulesets, Alerts and Incidents in Network Intrusion Detection., , and . AsiaCCS, page 799-814. ACM, (2022)RAR: Risk Aware Revocation Mechanism for Vehicular Networks., , , , , , and . VTC Spring, page 1-5. IEEE, (2012)On the Self-similarity Nature of the Revocation Data., , , , and . ISC, volume 7483 of Lecture Notes in Computer Science, page 387-400. Springer, (2012)