Searched for: author%3A%22Ciere%2C+M.%22
(1 - 4 of 4)
document
Noroozian, A. (author), Ciere, M. (author), Korczynski, M.T. (author), Tajalizadehkhoob, S. (author), van Eeten, M.J.G. (author)
conference paper 2017
document
Ciere, M. (author), Hernandez Ganan, C. (author), van Eeten, M.J.G. (author)
In computing, remote devices may be identified by means of device fingerprinting, which works by collecting a myriad of clientside attributes such as the device’s browser and operating system version, installed plugins, screen resolution, hardware artifacts, Wi-Fi settings, and anything else available to the server, and then merging these...
conference paper 2017
document
Riek, Markus (author), Boehme, Rainer (author), Ciere, M. (author), Hernandez Ganan, C. (author), van Eeten, M.J.G. (author)
While cybercrime has existed for many years and is still reported to be a growing problem, reliable estimates of the economic impacts are rare. We develop a survey instrument tailored to measure the costs of consumer-facing cybercrime systematically, by aggregating different cost factors into direct losses and expenses for protection measures....
conference paper 2016
document
Asghari, H. (author), Ciere, M. (author), Van Eeten, M.J.G. (author)
Research on botnet mitigation has focused predominantly on methods to technically disrupt the commandand-control infrastructure. Much less is known about the effectiveness of large-scale efforts to clean up infected machines. We analyze longitudinal data from the sinkhole of Conficker, one the largest botnets ever seen, to assess the impact of...
conference paper 2015
Searched for: author%3A%22Ciere%2C+M.%22
(1 - 4 of 4)