Publications

(2019). Poster: Challenges of Accurately Measuring Churn in P2P Botnets. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019.

PDF DOI

(2019). A Brief Review on MQTT's Security Issues within the Internet of Things (IoT). JCM.

PDF DOI

(2018). Next Generation P2P Botnets: Monitoring Under Adverse Conditions. Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings.

PDF DOI

(2018). Advanced Monitoring in P2P Botnets - A Dual Perspective. Springer.

PDF DOI

(2017). SensorBuster: On Identifying Sensor Nodes in P2P Botnets. Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017.

PDF DOI

(2017). I Trust my Zombies: A Trust-enabled Botnet. CoRR.

PDF

(2017). A temporal-aware signature extraction method using sliding-window mechanism for scalable, cost-effective and accurate traffic classification. 7th IEEE International Conference on Control System, Computing and Engineering, ICCSCE 2017, Penang, Malaysia, November 24-26, 2017.

PDF DOI

(2017). A Review on Features' Robustness in High Diversity Mobile Traffic Classifications. IJCNIS.

PDF

(2016). On the resilience of P2P-based botnet graphs. 2016 IEEE Conference on Communications and Network Security, CNS 2016, Philadelphia, PA, USA, October 17-19, 2016.

PDF DOI

(2016). BoobyTrap: On autonomously detecting and characterizing crawlers in P2P botnets. 2016 IEEE International Conference on Communications, ICC 2016, Kuala Lumpur, Malaysia, May 22-27, 2016.

PDF DOI

(2016). Advanced monitoring in P2P botnets.

PDF

(2015). Zeus Milker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism. 35th IEEE International Conference on Distributed Computing Systems, ICDCS 2015, Columbus, OH, USA, June 29 - July 2, 2015.

PDF DOI

(2015). Taxonomy and Survey of Collaborative Intrusion Detection. ACM Comput. Surv..

PDF DOI

(2015). Hide and seek: Detecting sensors in P2P botnets. 2015 IEEE Conference on Communications and Network Security, CNS 2015, Florence, Italy, September 28-30, 2015.

PDF DOI

(2015). A honeypot-driven cyber incident monitor: lessons learned and steps ahead. Proceedings of the 8th International Conference on Security of Information and Networks, SIN 2015, Sochi, Russian Federation, September 8-10, 2015.

PDF DOI

(2014). On advanced monitoring in resilient and unstructured P2P botnets. IEEE International Conference on Communications, ICC 2014, Sydney, Australia, June 10-14, 2014.

PDF DOI

(2014). HosTaGe: a Mobile Honeypot for Collaborative Defense. Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014.

PDF DOI

(2013). This network is infected: HosTaGe - a low-interaction honeypot for mobile devices. SPSM’13, Proceedings of the 2013 ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with CCS 2013, November 8, 2013, Berlin, Germany.

PDF DOI

(2012). Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art. CoRR.

PDF