Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Leon Böck"'
Publikováno v:
Proceedings 2023 Network and Distributed System Security Symposium.
Autor:
Leon Böck, Martin Fejrskov, Katerina Demetzou, Shankar Karuppayah, Max Mühlhäuser, Emmanouil Vasilomanolakis
Publikováno v:
Böck, L, Andersen, M F, Demetzou, K, Karuppayah, S, Mühlhäuser, M & Vasilomanolakis, E 2022, ' Processing of botnet tracking data under the GDPR ', Computer Law & Security Review, vol. 45, 105652 . https://doi.org/10.1016/j.clsr.2021.105652
The Computer Law and Security Report, 45
The Computer Law and Security Report, 45
Botnet research is one of the many research areas affected by the coming into force of the General Data Protection Regulation (GDPR). This article aims to identify the most appropriate legal bases that would legitimise data processing in the context
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::00dfe974f42cb94a7382c1f1f7f8393a
https://vbn.aau.dk/da/publications/2a956269-2ba8-4579-9ade-02c9b1fbd0f5
https://vbn.aau.dk/da/publications/2a956269-2ba8-4579-9ade-02c9b1fbd0f5
Publikováno v:
i-com. 18:197-216
Smart Home technologies have the potential to increase the quality of life, home security and facilitate elderly care. Therefore, they require access to a plethora of data about the users’ homes and private lives. Resulting security and privacy con
Publikováno v:
ARES
Machine learning based anomaly detection mechanisms are a promising tool to detect and protect networks from previously unknown attacks. The quality of those mechanisms strongly depends on the availability of large amounts of data for their training
Publikováno v:
Journal of Cyber Security and Mobility.
Online social networks (OSNs) represent powerful digital tools to communicate and quickly disseminate information in a non-official way. As they are freely accessible and easy to use, criminals abuse of them for achieving their purposes, for example,
Publikováno v:
eCrime
Böck, L, Alexopoulos, N, Saracoglu, E, Mühlhäuser, M & Vasilomanolakis, E 2020, Assessing the Threat of Blockchain-based Botnets . in 2019 APWG Symposium on Electronic Crime Research (eCrime) ., 9037600, IEEE, 2019 APWG Symposium on Electronic Crime Research (eCrime), Pittsburgh, Pennsylvania, United States, 13/11/2019 . https://doi.org/10.1109/eCrime47957.2019.9037600
Böck, L, Alexopoulos, N, Saracoglu, E, Mühlhäuser, M & Vasilomanolakis, E 2020, Assessing the Threat of Blockchain-based Botnets . in 2019 APWG Symposium on Electronic Crime Research (eCrime) ., 9037600, IEEE, 2019 APWG Symposium on Electronic Crime Research (eCrime), Pittsburgh, Pennsylvania, United States, 13/11/2019 . https://doi.org/10.1109/eCrime47957.2019.9037600
Time and time again the security community has faced novel threats that were previously never analyzed, sometimes with catastrophic results. To avoid this, proactive analysis of envisioned threats is of great importance. One such threat is blockchain
Publikováno v:
ARES
Proceedings of the 14th International Conference on Availability, Reliability and Security
Proceedings of the 14th International Conference on Availability, Reliability and Security-ARES 19
Proceedings of the 14th International Conference on Availability, Reliability and Security -ARES '19
Proceedings of the 14th International Conference on Availability, Reliability and Security
Proceedings of the 14th International Conference on Availability, Reliability and Security-ARES 19
Proceedings of the 14th International Conference on Availability, Reliability and Security -ARES '19
Social media represent one of the most popular online tools to spread and exchange formal and informal information based on specific human interests, habits and purposes. As they are free, easy to use and widely adopted, criminals commonly exploit th
Publikováno v:
Böck, L, Vasilomanolakis, E, Wolf, J H & Mühlhäuser, M 2019, ' Autonomously detecting sensors in fully distributed botnets ', Computers and Security, vol. 83, pp. 1-13 . https://doi.org/10.1016/j.cose.2019.01.004
Botnet attacks have devastating effects on public and private infrastructures. The botmasters controlling these networks aim to prevent takedown attempts by using highly resilient P2P overlays to commandeer their botnets, and even harden them with co
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bc2f52bd6333e373774352ec8fec4e9c
https://vbn.aau.dk/da/publications/1631e883-0c40-49c5-b0ed-425bc5e8d5fe
https://vbn.aau.dk/da/publications/1631e883-0c40-49c5-b0ed-425bc5e8d5fe
Publikováno v:
Living in the Internet of Things: Cybersecurity of the IoT-2018
The “Smart Bear” is a hypothetical connected-smart toy for children. While the functionalities it presents are appealing to both children and their parents, the privacy concerns that are raised should be taken into serious consideration. A big am
Autor:
Mathias Fischer, Selvakumar Manickam, Tim Grube, Shankar Karuppayah, Max Mühlhäuser, Leon Böck
Publikováno v:
ARES
The ever-growing number of cyber attacks originating from botnets has made them one of the biggest threat to the Internet ecosystem. Especially P2P-based botnets like ZeroAccess and Sality require special attention as they have been proven to be very