Author:
Ghiette Vincent,Blenn Norbert,Doerr Christian
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. I Know Who You Scanned Last Summer: Mapping the Landscape of Internet-Wide Scanners;2024 IFIP Networking Conference (IFIP Networking);2024-06-03
2. SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots;2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P);2023-07
3. A Near Real-Time Scheme for Collecting and Analyzing IoT Malware Artifacts at Scale;Proceedings of the 17th International Conference on Availability, Reliability and Security;2022-08-23
4. HoneyComb: A Darknet-Centric Proactive Deception Technique For Curating IoT Malware Forensic Artifacts;NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium;2022-04-25
5. Description of a Network Attack Ontology Presented Formally;Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities;2021