Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IoT dataset generation framework for evaluating anomaly detection mechanisms., , , and . ARES, page 30:1-30:6. ACM, (2020)How to Count Bots in Longitudinal Datasets of IP Addresses., , , , and . NDSS, The Internet Society, (2023)On IP-Based Botnet Measurements. TU Darmstadt, Germany, (2024)base-search.net (ftulbdarmstadt:oai:tuprints.ulb.tu-darmstadt.de:24761).Experiencing the Detection of Radicalized Criminals on Facebook Social Network and Data-related Issues., , , and . J. Cyber Secur. Mobil., 9 (2): 203-236 (2020)Processing of botnet tracking data under the GDPR., , , , , and . Comput. Law Secur. Rev., (2022)Poster: Challenges of Accurately Measuring Churn in P2P Botnets., , , , and . ACM Conference on Computer and Communications Security, page 2661-2663. ACM, (2019)The End of the Canonical IoT Botnet: A Measurement Study of Mirai's Descendants., , , , , and . CoRR, (2023)Autonomously detecting sensors in fully distributed botnets., , , and . Comput. Secur., (2019)An uneven game of hide and seek: Hiding botnet CnC by encrypting IPs in DNS records., , , and . CNS, page 164-172. IEEE, (2021)Limits in the data for detecting criminals on social media., , , and . ARES, page 51:1-51:8. ACM, (2019)