Search

Your search keyword '"Emmanouil Vasilomanolakis"' showing total 100 results

Search Constraints

Start Over You searched for: Author "Emmanouil Vasilomanolakis" Remove constraint Author: "Emmanouil Vasilomanolakis"
100 results on '"Emmanouil Vasilomanolakis"'

Search Results

53. Botnet Business Models, Takedown Attempts, and the Darkweb Market:A Survey

54. Gotta catch ’em all: a Multistage Framework for honeypot fingerprinting

57. Detecting DNS hijacking by using NetFlow data

61. Deceptive directories and 'vulnerable' logs: a honeypot study of the LDAP and log4j attack landscape

62. A Bad IDEa: Weaponizing uncontrolled online-IDEs in availability attacks

65. Interaction matters: a comprehensive analysis and a dataset of hybrid IoT/OT honeypots

69. Open for hire:attack trends and misconfiguration pitfalls of IoT devices

73. TRIDEnT:Towards a Decentralized Threat Indicator Marketplace

74. ethVote:Towards secure voting with distributed ledgers

75. Cyber-security research by ISPs:A NetFlow and DNS Anonymization Policy

76. Assessing the Threat of Blockchain-based Botnets

77. Network entity characterization and attack prediction

78. Autonomously detecting sensors in fully distributed botnets

79. On generating network traffic datasets with synthetic attacks for intrusion detection

80. Don't steal my drone: Catching attackers with an unmanned aerial vehicle honeypot

81. Towards Blockchain-Based Collaborative Intrusion Detection Systems

82. CHALLENGES AND AVAILABLE SOLUTIONS AGAINST ORGANIZED CYBER-CRIME AND TERRORIST NETWORKS

83. Detection and mitigation of monitor identification attacks in collaborative intrusion detection systems

84. BoobyTrap: On autonomously detecting and characterizing crawlers in P2P botnets

85. Towards the creation of synthetic, yet realistic, intrusion detection datasets

86. Multi-stage attack detection and signature generation with ICS honeypots

87. A honeypot-driven cyber incident monitor

88. ID2T: A DIY dataset creation toolkit for Intrusion Detection Systems

89. Probe-response attacks on collaborative intrusion detection systems: Effectiveness and countermeasures

90. A survey of technologies for the internet of things

91. Security Perspectives for Collaborative Data Acquisition in the Internet of Things

92. This network is infected

93. Did you really hack a nuclear power plant? An industrial control mobile honeypot

95. HosTaGe: a Mobile Honeypot for Collaborative Defense

97. Next Generation P2P Botnets: Monitoring Under Adverse Conditions

99. Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions

Catalog

Books, media, physical & digital resources