Author of the publication

BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets

, , , , and . IEEE International Conference on Communications (ICC),, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets, , , , and . IEEE International Conference on Communications (ICC),, (2016)Efficient Attack Correlation and Identification of Attack Scenarios based on Network-Motifs., , and . IPCCC, page 1-11. IEEE, (2019)Zeek-Osquery: Host-Network Correlation for Advanced Monitoring and Intrusion Detection., , and . SEC, volume 580 of IFIP Advances in Information and Communication Technology, page 248-262. Springer, (2020)Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring., , , and . SEC, volume 648 of IFIP Advances in Information and Communication Technology, page 87-105. Springer, (2022)Security Monitoring and Alert Correlation for Network Intrusion Detection.. University of Hamburg, Germany, (2020)On the Resilience of P2P-based Botnet Graphs, , , , and . IEEE Conference on Communications and Network Security (CNS), (2016)Multi-Stage Attack Detection via Kill Chain State Machines., , , , and . CYSARM@CCS, page 13-24. ACM, (2021)Towards Efficient Reconstruction of Attacker Lateral Movement., , , , and . ARES, page 14:1-14:9. ACM, (2019)Scan Correlation - Revealing distributed scan campaigns., , and . NOMS, page 1-6. IEEE, (2020)Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring., , , and . CoRR, (2021)