Christian Doerr

Affiliations:
  • University of Colorado, USA


According to our database1, Christian Doerr authored at least 63 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Could you clean up the Internet with a Pit of Tar? Investigating tarpit feasibility on Internet worms.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

How to Count Bots in Longitudinal Datasets of IP Addresses.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
Clustering Payloads: Grouping Randomized Scan Probes Into Campaign Templates.
Proceedings of the IFIP Networking Conference, 2022

Adding Zero Trust in BYOD Environments through Network Inspection.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

2021
Cyber Security Threats to Bitcoin Exchanges: Adversary Exploitation and Laundering Techniques.
IEEE Trans. Netw. Serv. Manag., 2021

Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers.
IACR Cryptol. ePrint Arch., 2021

SIP Bruteforcing in the Wild - An Assessment of Adversaries, Techniques and Tools.
Proceedings of the IFIP Networking Conference, 2021

Scan, Test, Execute: Adversarial Tactics in Amplification DDoS Attacks.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Inside the Matrix: CTI Frameworks as Partial Abstractions of Complex Threats.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Analysis and Takeover of the Bitcoin-Coordinated Pony Malware.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
IMDfence: Architecting a Secure Protocol for Implantable Medical Devices.
IEEE Access, 2020

A different cup of TI? The added value of commercial threat intelligence.
Proceedings of the 29th USENIX Security Symposium, 2020

Discovering Collaboration: Unveiling Slow, Distributed Scanners based on Common Header Field Patterns.
Proceedings of the NOMS 2020, 2020

Quantifying TCP SYN DDoS Resilience: A Longitudinal Study of Internet Services.
Proceedings of the 2020 IFIP Networking Conference, 2020

Scaling website fingerprinting.
Proceedings of the 2020 IFIP Networking Conference, 2020

From Hodl to Heist: Analysis of Cyber Security Threats to Bitcoin Exchanges.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

Examining Mirai's Battle over the Internet of Things.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Quality Evaluation of Cyber Threat Intelligence Feeds.
Proceedings of the Applied Cryptography and Network Security, 2020

Quantifying autonomous system IP churn using attack traffic of botnets.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale.
Proceedings of the 28th USENIX Security Symposium, 2019

SoK: ATT&CK Techniques and Trends in Windows Malware.
Proceedings of the Security and Privacy in Communication Networks, 2019

Fingerprinting Tooling used for SSH Compromisation Attempts.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Taxonomy and Adversarial Strategies of Random Subdomain Attacks.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

The Curious Case of Port 0.
Proceedings of the 2019 IFIP Networking Conference, 2019

Just the Tip of the Iceberg: Internet-Scale Exploitation of Routers for Cryptojacking.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
A data reduction strategy and its application on scan and backscatter detection using rule-based classifiers.
Expert Syst. Appl., 2018

How Media Reports Trigger Copycats: An Analysis of the Brewing of the Largest Packet Storm to Date.
Proceedings of the 2018 Workshop on Traffic Measurements for Cybersecurity, 2018

Security Vulnerabilities in LoRaWAN.
Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation, 2018

Malware Coordination using the Blockchain: An Analysis of the Cerber Ransomware.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Last Line of Defense: A Novel IDS Approach Against Advanced Threats in Industrial Control Systems.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

Side-Channel Based Intrusion Detection for Industrial Control Systems.
Proceedings of the Critical Information Infrastructures Security, 2017

Discovering Bitcoin Mixing Using Anomaly Detection.
Proceedings of the Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 2017

Quantifying the Spectrum of Denial-of-Service Attacks through Internet Backscatter.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

Popularity-based Detection of Domain Generation Algorithms.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Remote Identification of Port Scan Toolchains.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

Understanding Bifurcation of Slow Versus Fast Cyber-Attackers.
Proceedings of the Data Privacy Management and Security Assurance, 2016

Scan prediction and reconnaissance mitigation through commodity graphics cards.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2014
All quiet on the internet front?
IEEE Commun. Mag., 2014

7 challenges to effective resilience engineering.
Proceedings of the 21st IEEE Symposium on Communications and Vehicular Technology in the Benelux, 2014

OpenNetMon: Network monitoring in OpenFlow Software-Defined Networks.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

eFuzz: A Fuzzer for DLMS/COSEM Electricity Meters.
Proceedings of the 2nd Workshop on Smart Energy Grid Security, 2014

2013
Lognormal Infection Times of Online Information Spread
CoRR, 2013

Metric convergence in social network sampling.
Proceedings of the 5th ACM workshop on Hot topics in planet-scale measurement, 2013

Challenge tracing and mitigation under partial information and uncertainty.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Are friends overrated? A study for the social news aggregator Digg.com.
Comput. Commun., 2012

How much do your friends know about you?: reconstructing private information from the friendship graph.
Proceedings of the Fifth Workshop on Social Network Systems, 2012

Challenge-Aware Traffic Protection in Wireless Mobile Backhaul Networks.
Proceedings of the NETWORKING 2012 Workshops, 2012

Crawling and Detecting Community Structure in Online Social Networks Using Local Information.
Proceedings of the NETWORKING 2012, 2012

Context-Sensitive Sentiment Classification of Short Colloquial Text.
Proceedings of the NETWORKING 2012, 2012

2011
Digging in the Digg Social News Website.
IEEE Trans. Multim., 2011

Are Friends Overrated? A Study for the Social Aggregator Digg.com.
Proceedings of the NETWORKING 2011, 2011

Parallelized network-driven analysis of network systems on commodity hardware.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2011

2009
Local control of cognitive radio networks.
Ann. des Télécommunications, 2009

Network Heterogeneity and Cascading Failures - An Evaluation for the Case of BGP Vulnerability.
Proceedings of the Self-Organizing Systems, 4th IFIP TC 6 International Workshop, 2009

2008
Enhancing Cognitive Radio Algorithms Through Efficient, Automatic Adaptation Management.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

Scalability of cognitive radio control algorithms.
Proceedings of the Third International Symposium on Wireless Pervasive Computing, 2008

Dynamic Control Channel Assignment in Cognitive Radio Networks Using Swarm Intelligence.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Local Independent Control of Cognitive Radio Networks.
Proceedings of the 3rd International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2008

2007
What a cognitive radio network could learn from a school of fish.
Proceedings of the 3rd International ICSTConference on Wireless Internet, 2007

Simplifying web traversals by recognizing behavior patterns.
Proceedings of the HYPERTEXT 2007, 2007

Experiences Implementing Cognitive Radio Control Algorithms.
Proceedings of the Global Communications Conference, 2007

Optimizing for sparse training of Cognitive Radio networks.
Proceedings of the First International Workshop on Cognitive Wireless Networks, 2007

2006
MOJO: a distributed physical layer anomaly detection system for 802.11 WLANs.
Proceedings of the 4th International Conference on Mobile Systems, 2006


  Loading...