Author of the publication

ZeusMilker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism

, , , , and . IEEE International Conference on Distributed Computing Systems (ICDCS), (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hide And Seek: Detecting Sensors In P2P Botnets, , , , and . IEEE Conference on Communications and Network Security, page 731--732. (2015)HosTaGe: a Mobile Honeypot for Collaborative Defense, , , and . International Conference on Security of Information and Networks, (2014)This Network is Infected : HosTaGe - a Low-Interaction Honeypot for Mobile Devices, , , , , , and . Security and Privacy in Smartphones & Mobile Devices, page 43--48. (2013)BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets, , , , and . IEEE International Conference on Communications (ICC),, (2016)MundoMessage: enabling trustworthy ubiquitous emergency communication, , , and . Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, page 29:1--29:10. New York, NY, USA, ACM, (2011)An Unusual CS 1 with High Standards and Confirming Results, and . Proceedings of the fifteenth annual conference on Innovation and technology in computer science education, page 169--173. New York, NY, ACM, (2010)”I Don’t Know How to Protect Myself”: Understanding Privacy Perceptions Resulting from the Presence of Bystanders in Smart Environments, , , , , and . Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society, New York, NY, USA, Association for Computing Machinery, (2020)A honeypot-driven cyber incident monitor: lessons learned and steps ahead, , , and . International Conference on Security of Information and Networks, (2015)On Advanced Monitoring in Resilient and Unstructured P2P Botnets, , , and . IEEE International Conference on Communications (ICC), (2014)ZeusMilker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism, , , , and . IEEE International Conference on Distributed Computing Systems (ICDCS), (2015)