Searched for: contributor%3A%22Doerr%2C+Christian+%28mentor%29%22
(1 - 18 of 18)
VPN Fingerprinting
VPN Fingerprinting: Network protocol detection inside virtual private network tunnels
Formjackers
Formjackers: Towards an Internet-scale Survey of Credit Card Skimming on the Web
BGP security and the future
BGP security and the future: A meta-analysis of BGP threats and security to provide a new direction for practical BGP security
Analysing BGP Origin Hijacks
Analysing BGP Origin Hijacks
Android App Tracking
Android App Tracking: Investigating the feasibility of tracking user behavior on mobile phones by analyzing encrypted network traffic
Inadvertently Making Cybercriminals Rich
Inadvertently Making Cybercriminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale
Clusus
Clusus: A cyber range for network attack simulations
Placement Strategies to Monitor the Inter-Autonomous System Routing Information
Placement Strategies to Monitor the Inter-Autonomous System Routing Information
Detecting BGP Origin Hijacks
Detecting BGP Origin Hijacks: Using a filter-based approach
Inferring relationship types and simulating BGP traffic between Autonomous Systems using the valley-free constraint
Inferring relationship types and simulating BGP traffic between Autonomous Systems using the valley-free constraint
Scanners: Discovery of distributed slow scanners in telescope data
Scanners: Discovery of distributed slow scanners in telescope data
Approximate Automated Campaign Analysis with Density Based Clustering
Approximate Automated Campaign Analysis with Density Based Clustering
Extending Honeytrap with Lua scripting
Extending Honeytrap with Lua scripting: Honeytrap LUA implementation
Classification of Distributed Strategies for Port Scan Reconnaissance
Classification of Distributed Strategies for Port Scan Reconnaissance
Practical Microarchitectural Attacks from Integrated GPUs
Practical Microarchitectural Attacks from Integrated GPUs
Application-level Network Behavior Analysis and Anomaly Detection using Density Based Clustering
Application-level Network Behavior Analysis and Anomaly Detection using Density Based Clustering
Popularity-based Detection of Domain Generation Algorithms
Popularity-based Detection of Domain Generation Algorithms: Or: How to detect botnets?
Exploitation of Cache Based Side-Channels on ARM
Exploitation of Cache Based Side-Channels on ARM: Correlation Analysis of Access-driven Cache Attacks on Android Smartphones
Searched for: contributor%3A%22Doerr%2C+Christian+%28mentor%29%22
(1 - 18 of 18)