C. Dörr
37 records found
1
Clustering Payloads
Grouping Randomized Scan Probes Into Campaign Templates
Scan, Test, Execute
Adversarial Tactics in Amplification DDoS Attacks
Cyber Security Threats to Bitcoin Exchanges
Adversary Exploitation and Laundering Techniques
Inside the Matrix
CTI Frameworks as Partial Abstractions of Complex Threats
Compare Before You Buy
Privacy-Preserving Selection of Threat Intelligence Providers
From Hodl to Heist
Analysis of Cyber Security Threats to Bitcoin Exchanges
IMDfence
Architecting a Secure Protocol for Implantable Medical Devices
Discovering Collaboration
Unveiling Slow, Distributed Scanners based on Common Header Field Patterns
SoK
ATT&CK techniques and trends in windows malware
Just the tip of the iceberg
Internet-scale exploitation of routers for cryptojacking
Inadvertently making cyber criminals rich
A comprehensive study of cryptojacking campaigns at internet scale
Malware Coordination using the Blockchain
An Analysis of the Cerber Ransomware
How Media Reports Trigger Copycats
An Analysis of the Brewing of the Largest Packet Storm to Date