C. Dörr
43 records found
1
Clustering Payloads
Grouping Randomized Scan Probes Into Campaign Templates
Inside the Matrix
CTI Frameworks as Partial Abstractions of Complex Threats
Compare Before You Buy
Privacy-Preserving Selection of Threat Intelligence Providers
Scan, Test, Execute
Adversarial Tactics in Amplification DDoS Attacks
Cyber Security Threats to Bitcoin Exchanges
Adversary Exploitation and Laundering Techniques
IMDfence
Architecting a Secure Protocol for Implantable Medical Devices
From Hodl to Heist
Analysis of Cyber Security Threats to Bitcoin Exchanges
Discovering Collaboration
Unveiling Slow, Distributed Scanners based on Common Header Field Patterns
SoK
ATT&CK techniques and trends in windows malware
Inadvertently making cyber criminals rich
A comprehensive study of cryptojacking campaigns at internet scale
Just the tip of the iceberg
Internet-scale exploitation of routers for cryptojacking
Malware Coordination using the Blockchain
An Analysis of the Cerber Ransomware
How Media Reports Trigger Copycats
An Analysis of the Brewing of the Largest Packet Storm to Date