Author of the publication

The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet

, , , , , , , and . Annual Computer Security Applications Conference, page .. Austin, Texas États-Unis, (Dec 6, 2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Talking Agents: A distributed architecture for interactive artistic installations., and . Integr. Comput. Aided Eng., 17 (3): 243-259 (2010)An isolated virtual cluster for SCADA network security research., , and . ICS-CSR, BCS, (2013)Optimal Algorithmic Cooling of Spins., , , and . UC, volume 4618 of Lecture Notes in Computer Science, page 2-26. Springer, (2007)A Cyber-Physical Testbed for Measuring the Impacts of Cyber Attacks on Urban Road Networks., , , and . Critical Infrastructure Protection, volume 542 of IFIP Advances in Information and Communication Technology, page 177-196. Springer, (2018)Providing SCADA Network Data Sets for Intrusion Detection Research., and . CSET @ USENIX Security Symposium, USENIX Association, (2016)The never ending war in the stack and the reincarnation of ROP attacks., , and . CoRR, (2020)Analyzing the Resiliency of Microgrid Control Algorithms Against Malicious Input., , , and . CCECE, page 1-6. IEEE, (2020)Optimising sybil attacks against P2P-based botnets., , and . MALWARE, page 78-87. IEEE Computer Society, (2009)Scalable Security Verification of Software at Compile Time., , , , and . SCAM, page 115-124. IEEE Computer Society, (2014)Shoulder Arthroscopy Training System with Force Feedback., , , and . MediVis, page 71-76. IEEE Computer Society, (2006)