Search

Your search keyword '"Emmanouil Vasilomanolakis"' showing total 36 results

Search Constraints

Start Over You searched for: Author "Emmanouil Vasilomanolakis" Remove constraint Author: "Emmanouil Vasilomanolakis" Language undetermined Remove constraint Language: undetermined
36 results on '"Emmanouil Vasilomanolakis"'

Search Results

1. COVID-19 Vaccination Certificates in the Darkweb

2. A decentralized honeypot for IoT Protocols based on Android devices

3. Deceptive directories and 'vulnerable' logs: a honeypot study of the LDAP and log4j attack landscape

8. Using NetFlow to Measure the Impact of Deploying DNS-based Blacklists

9. Assessing the Threat of Blockchain-based Botnets

10. On generating network traffic datasets with synthetic attacks for intrusion detection

11. Don't steal my drone: Catching attackers with an unmanned aerial vehicle honeypot

12. HoneyDrone: A medium-interaction unmanned aerial vehicle honeypot

13. Towards Blockchain-Based Collaborative Intrusion Detection Systems

14. Taxonomy and Survey of Collaborative Intrusion Detection

15. Defending against Probe-Response Attacks

16. CHALLENGES AND AVAILABLE SOLUTIONS AGAINST ORGANIZED CYBER-CRIME AND TERRORIST NETWORKS

17. Detection and mitigation of monitor identification attacks in collaborative intrusion detection systems

18. On probe-response attacks in Collaborative Intrusion Detection Systems

19. BoobyTrap: On autonomously detecting and characterizing crawlers in P2P botnets

20. Towards the creation of synthetic, yet realistic, intrusion detection datasets

21. Multi-stage attack detection and signature generation with ICS honeypots

22. SkipMon: A locality-aware Collaborative Intrusion Detection System

23. A honeypot-driven cyber incident monitor

24. On the Security and Privacy of Internet of Things Architectures and Systems

25. ID2T: A DIY dataset creation toolkit for Intrusion Detection Systems

26. Probe-response attacks on collaborative intrusion detection systems: Effectiveness and countermeasures

27. A survey of technologies for the internet of things

28. Community-Based Collaborative Intrusion Detection

29. Security Perspectives for Collaborative Data Acquisition in the Internet of Things

30. This network is infected

31. Did you really hack a nuclear power plant? An industrial control mobile honeypot

33. HosTaGe: a Mobile Honeypot for Collaborative Defense

Catalog

Books, media, physical & digital resources