Search

Your search keyword '"Emmanouil Vasilomanolakis"' showing total 34 results

Search Constraints

Start Over You searched for: Author "Emmanouil Vasilomanolakis" Remove constraint Author: "Emmanouil Vasilomanolakis" Topic computer science Remove constraint Topic: computer science
34 results on '"Emmanouil Vasilomanolakis"'

Search Results

1. Open for hire:attack trends and misconfiguration pitfalls of IoT devices

2. Using NetFlow to Measure the Impact of Deploying DNS-based Blacklists

3. Visualizing the Bitcoin’s OP_RETURN operator

4. TRIDEnT:Towards a Decentralized Threat Indicator Marketplace

5. ethVote:Towards secure voting with distributed ledgers

6. Cyber-security research by ISPs:A NetFlow and DNS Anonymization Policy

7. Assessing the Threat of Blockchain-based Botnets

8. Network entity characterization and attack prediction

9. Autonomously detecting sensors in fully distributed botnets

10. On generating network traffic datasets with synthetic attacks for intrusion detection

11. Don't steal my drone: Catching attackers with an unmanned aerial vehicle honeypot

12. HoneyDrone: A medium-interaction unmanned aerial vehicle honeypot

13. Towards Blockchain-Based Collaborative Intrusion Detection Systems

14. Taxonomy and Survey of Collaborative Intrusion Detection

15. Defending against Probe-Response Attacks

16. CHALLENGES AND AVAILABLE SOLUTIONS AGAINST ORGANIZED CYBER-CRIME AND TERRORIST NETWORKS

17. On probe-response attacks in Collaborative Intrusion Detection Systems

18. Detection and mitigation of monitor identification attacks in collaborative intrusion detection systems

19. BoobyTrap: On autonomously detecting and characterizing crawlers in P2P botnets

20. Towards the creation of synthetic, yet realistic, intrusion detection datasets

21. Multi-stage attack detection and signature generation with ICS honeypots

22. SkipMon: A locality-aware Collaborative Intrusion Detection System

23. A honeypot-driven cyber incident monitor

24. On the Security and Privacy of Internet of Things Architectures and Systems

25. ID2T: A DIY dataset creation toolkit for Intrusion Detection Systems

26. Probe-response attacks on collaborative intrusion detection systems: Effectiveness and countermeasures

27. A survey of technologies for the internet of things

28. Community-Based Collaborative Intrusion Detection

29. Security Perspectives for Collaborative Data Acquisition in the Internet of Things

30. This network is infected

31. Did you really hack a nuclear power plant? An industrial control mobile honeypot

32. HosTaGe: a Mobile Honeypot for Collaborative Defense

33. Next Generation P2P Botnets: Monitoring Under Adverse Conditions

34. Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions

Catalog

Books, media, physical & digital resources