Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

WPAD: Waiting Patiently for an Announced Disaster., and . ACM Comput. Surv., 55 (10): 217:1-217:29 (2023)Botnet Sizes: When Maths Meet Myths., , , , and . ICSOC Workshops, volume 12632 of Lecture Notes in Computer Science, page 596-611. Springer, (2020)Honeypot platform : analyses and results, and . EURECOM+1563. Institut Eurecom, France, (October 2004)Insights on the Security and Dependability of Industrial Control Systems., , , , and . IEEE Secur. Priv., 12 (6): 75-78 (2014)A framework for attack patterns' discovery in honeynet data., and . Digit. Investig., 5 (Supplement): S128-S139 (2008)Towards Detecting and Geolocalizing Web Scrapers with Round Trip Time Measurements., , and . TMA, page 1-4. IEEE, (2023)ImMuNE: Improved Multilateration in Noisy Environments., , and . CloudNet, page 1-6. IEEE, (2022)A strategic analysis of spam botnets operations., and . CEAS, page 162-171. ACM, (2011)Honeypot-based forensics, and . \Aus\CERT2004, \Aus\CERT \Asia \Pacific \Information technology \Security \Conference 2004, 23rd - 27th \May 2004, \Brisbane, \Australia, (May 2004)Security Challenges and Opportunities of Software-Defined Networking., , , , and . IEEE Secur. Priv., 15 (2): 96-100 (2017)