Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Hernandez Ganan, C."'
Autor:
Streibelt, Florian, Lindorfer, Martina, Gürses, F.S., Hernandez Ganan, C., Fiebig, T., Brunstrom, Anna, Flores, Marcel, Fiore, Marco
Publikováno v:
Passive and Active Measurement
Lecture Notes in Computer Science
Passive and Active Measurement-24th International Conference, PAM 2023, Proceedings
Passive and Active Measurement ISBN: 9783031284854
Lecture Notes in Computer Science
Passive and Active Measurement-24th International Conference, PAM 2023, Proceedings
Passive and Active Measurement ISBN: 9783031284854
Researchers and practitioners often face the issue of having to attribute an IP address to an organization. For current data this is comparably easy, using services like whois or other databases. Similarly, for historic data, several entities like th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5e213b26f52c0c6e0708ab8616a1344e
https://hdl.handle.net/21.11116/0000-000C-182D-821.11116/0000-000C-CC67-B21.11116/0000-000C-182B-A21.11116/0000-000C-8113-C
https://hdl.handle.net/21.11116/0000-000C-182D-821.11116/0000-000C-CC67-B21.11116/0000-000C-182B-A21.11116/0000-000C-8113-C
Autor:
Streibelt, Florian, Sattler, Patrick, Lichtblau, Franziska, Hernandez Ganan, C., Feldmann, Anja, Gasser, Oliver, Fiebig, Tobias, Brunstrom, Anna, Flores, Marcel, Fiore, Marco
Publikováno v:
Passive and Active Measurement-24th International Conference, PAM 2023, Proceedings
Passive and Active Measurement
Lecture Notes in Computer Science
Passive and Active Measurement ISBN: 9783031284854
Passive and Active Measurement
Lecture Notes in Computer Science
Passive and Active Measurement ISBN: 9783031284854
DNS is one of the core building blocks of the Internet. In this paper, we investigate DNS resolution in a strict IPv6-only scenario and find that a substantial fraction of zones cannot be resolved. We point out, that the presence of an resource recor
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6c0c3c6f749c6d5afbf89864f9d54100
Autor:
Nosyk, Yevheniya, Lone, Qasim, Zhauniarovich, Y., Hernandez Ganan, C., Aben, Emile, Moura, Giovane C. M., Tajalizadehkhoob, Samaneh, Duda, Andrzej, Korczyński, Maciej, Brunstrom, Anna, Flores, Marcel, Fiore, Marco
Publikováno v:
Passive and Active Measurement ISBN: 9783031284854
Passive and Active Measurement-24th International Conference, PAM 2023, Proceedings
Passive and Active Measurement-24th International Conference, PAM 2023, Proceedings
DNS is a protocol responsible for translating human-readable domain names into IP addresses. Despite being essential for many Internet services to work properly, it is inherently vulnerable to manipulation. In November 2021, users from Mexico receive
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b8ff434e3f44ec24e100a551e40e860b
https://doi.org/10.1007/978-3-031-28486-1_19
https://doi.org/10.1007/978-3-031-28486-1_19
Autor:
Sasaki, Takayuki, Fujita, Akira, Hernandez Ganan, C., van Eeten, M.J.G., Yoshioka, Katsunari, Matsumoto, Tsutomu
Publikováno v:
Proceedings-43rd IEEE Symposium on Security and Privacy, SP 2022
Geographically distributed infrastructures, such as buildings, dams, and solar power plants, are commonly maintained via Internet-connected remote management devices. Previous studies on detecting and securing industrial control systems (ICS) have ov
Publikováno v:
11th International Conference on the Internet of Things, IoT 2021-Conference Proceedings
IoT devices keep entering our homes with the promise of delivering more services and enhancing user experience; however, these new devices also carry along an alarming number of vulnerabilities and security issues. In most cases, the users of these d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cb3d28c4d5e01c2f49d7f7e8dae693a2
http://arxiv.org/abs/2203.04776
http://arxiv.org/abs/2203.04776
Publikováno v:
ASIA CCS 2022-Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security
Notwithstanding the predicted demise of signature-based network monitoring, it is still part of the bedrock of security operations. Rulesets are fundamental to the efficacy of Network Intrusion Detection Systems (NIDS). Yet, they have rarely been stu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2732646f6238068c27eb936182adfafd
http://resolver.tudelft.nl/uuid:b8271b80-a38e-41f1-8455-a728040ce795
http://resolver.tudelft.nl/uuid:b8271b80-a38e-41f1-8455-a728040ce795
Autor:
Bouwmeester, Brennen, Turcios Rodriguez, E.R., Hernandez Ganan, C., van Eeten, M.J.G., Parkin, S.E.
Publikováno v:
Proceedings of the 17th Symposium on Usable Privacy and Security, SOUPS 2021
Many consumer Internet-of-Things (IoT) devices are, and will remain, subject to compromise, often without the owner's knowledge. Internet Service Providers (ISPs) are among the actors best-placed to coordinate the remediation of these problems. They
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::d919dd9cd133a0d9b54db469215a343d
http://resolver.tudelft.nl/uuid:ad842548-b8b7-46c8-94b8-85d839d75c80
http://resolver.tudelft.nl/uuid:ad842548-b8b7-46c8-94b8-85d839d75c80
Publikováno v:
Workshop on the Economics of Information Security
The emergence of Cybercrime-as-a-Service (CaaS) is a critical evolution in the cybercrime landscape. A key area of research on CaaS is where and how the supply of CaaS is being matched with demand. Next to underground marketplaces and custom websites
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::3e3f60a3d3a8d92ce05690eeb26ad713
http://resolver.tudelft.nl/uuid:01cb117a-339c-42e9-9691-8456a12e3947
http://resolver.tudelft.nl/uuid:01cb117a-339c-42e9-9691-8456a12e3947
Autor:
Nadeem, A., Hammerschmidt, C.A., Hernandez Ganan, C., Verwer, S.E., Shalaginov, Andrii, Stamp, Mark, Alazab, Mamoun
Publikováno v:
Malware Analysis using Artificial Intelligence and Deep Learning
Malware Analysis Using Artificial Intelligence and Deep Learning ISBN: 9783030625818
Malware Analysis Using Artificial Intelligence and Deep Learning ISBN: 9783030625818
Malware family labels are known to be inconsistent. They are also black-box since they do not represent the capabilities of malware. The current state of the art in malware capability assessment includes mostly manual approaches, which are infeasible
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0fae753a6bbfe8bd68ab2649f820c4cf
http://resolver.tudelft.nl/uuid:e2f9ce07-c946-481c-b545-5e93eea19371
http://resolver.tudelft.nl/uuid:e2f9ce07-c946-481c-b545-5e93eea19371
Publikováno v:
Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018)
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::983d2615a4b44500d903fc8924ca6361
http://resolver.tudelft.nl/uuid:b4e17c7b-122c-4fdf-b117-44717c94dfce
http://resolver.tudelft.nl/uuid:b4e17c7b-122c-4fdf-b117-44717c94dfce