Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Leurre.com Project: Collecting Internet Threats Information using a Worldwide Distributed Honeynet, , , , , , and . In Proceedings of the 1 st WOMBAT Workshop on Information Security Threat Data Exchange(WISTDE), IEEE Computer Society, (2008)Extending .NET Security to Unmanaged Code., , , and . ISC, volume 4176 of Lecture Notes in Computer Science, page 1-16. Springer, (2006)Getting Under Alexa's Umbrella: Infiltration Attacks Against Internet Top Domain Lists., , , , and . ISC, volume 11723 of Lecture Notes in Computer Science, page 255-276. Springer, (2019)Reverse Social Engineering Attacks in Online Social Networks., , , , and . DIMVA, volume 6739 of Lecture Notes in Computer Science, page 55-74. Springer, (2011)SecuBat: a web vulnerability scanner., , , and . WWW, page 247-256. ACM, (2006)Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters., , , , , and . RAID, volume 8145 of Lecture Notes in Computer Science, page 369-389. Springer, (2013)Securing Legacy Firefox Extensions with SENTINEL., , , and . DIMVA, volume 7967 of Lecture Notes in Computer Science, page 122-138. Springer, (2013)On the Effectiveness of Techniques to Detect Phishing Sites., , , and . DIMVA, volume 4579 of Lecture Notes in Computer Science, page 20-39. Springer, (2007)XGuide - A Practical Guide to XML-Based Web Engineering., , and . NETWORKING Workshops, volume 2376 of Lecture Notes in Computer Science, page 104-117. Springer, (2002)Server-Side Bot Detection in Massively Multiplayer Online Games., , , and . IEEE Secur. Priv., 7 (3): 29-36 (2009)