Search

Your search keyword '"Emmanouil Vasilomanolakis"' showing total 26 results

Search Constraints

Start Over You searched for: Author "Emmanouil Vasilomanolakis" Remove constraint Author: "Emmanouil Vasilomanolakis" Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection
26 results on '"Emmanouil Vasilomanolakis"'

Search Results

1. Sphinx: a Colluder-Resistant Trust Mechanism for Collaborative Intrusion Detection

2. COVID-19 Vaccination Certificates in the Darkweb

3. Botnet Business Models, Takedown Attempts, and the Darkweb Market:A Survey

4. Gotta catch ’em all: a Multistage Framework for honeypot fingerprinting

5. Detecting DNS hijacking by using NetFlow data

6. Deceptive directories and 'vulnerable' logs: a honeypot study of the LDAP and log4j attack landscape

7. A Bad IDEa: Weaponizing uncontrolled online-IDEs in availability attacks

8. Processing of botnet tracking data under the GDPR

9. Interaction matters: a comprehensive analysis and a dataset of hybrid IoT/OT honeypots

10. Open for hire:attack trends and misconfiguration pitfalls of IoT devices

11. Cyber-security research by ISPs:A NetFlow and DNS Anonymization Policy

12. Network entity characterization and attack prediction

13. Autonomously detecting sensors in fully distributed botnets

14. On generating network traffic datasets with synthetic attacks for intrusion detection

15. Don't steal my drone: Catching attackers with an unmanned aerial vehicle honeypot

16. HoneyDrone: A medium-interaction unmanned aerial vehicle honeypot

17. Towards Blockchain-Based Collaborative Intrusion Detection Systems

18. Taxonomy and Survey of Collaborative Intrusion Detection

19. Defending against Probe-Response Attacks

20. CHALLENGES AND AVAILABLE SOLUTIONS AGAINST ORGANIZED CYBER-CRIME AND TERRORIST NETWORKS

21. Multi-stage attack detection and signature generation with ICS honeypots

22. SkipMon: A locality-aware Collaborative Intrusion Detection System

23. A honeypot-driven cyber incident monitor

24. On the Security and Privacy of Internet of Things Architectures and Systems

25. Community-Based Collaborative Intrusion Detection

26. Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions

Catalog

Books, media, physical & digital resources