Emmanouil Vasilomanolakis

Orcid: 0000-0001-5068-9158

According to our database1, Emmanouil Vasilomanolakis authored at least 59 papers between 2013 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Botnet Business Models, Takedown Attempts, and the Darkweb Market: A Survey.
ACM Comput. Surv., November, 2023

Correction to: A decentralized honeypot for IoT Protocols based on Android devices.
Int. J. Inf. Sec., 2023

An Analysis of War Impact on Ukrainian Critical Infrastructure Through Network Measurements.
Proceedings of the 7th Network Traffic Measurement and Analysis Conference, 2023

In the Market for a Botnet? An In-Depth Analysis of Botnet-Related Listings on Darkweb Marketplaces.
Proceedings of the APWG Symposium on Electronic Crime Research, 2023

SweetCam: an IP Camera Honeypot.
Proceedings of the 5th Workshop on CPS&IoT Security and Privacy, 2023

Cheaper than you thought? A dive into the darkweb market of cyber-crime products.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
A decentralized honeypot for IoT Protocols based on Android devices.
Int. J. Inf. Sec., 2022

Processing of botnet tracking data under the GDPR.
Comput. Law Secur. Rev., 2022

Tick Tock Break the Clock: Breaking CAPTCHAs on the Darkweb.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

A Study on the Use of 3rd Party DNS Resolvers for Malware Filtering or Censorship Circumvention.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

Honeysweeper: Towards Stealthy Honeytoken Fingerprinting Techniques.
Proceedings of the Secure IT Systems, 2022

Deceptive directories and "vulnerable" logs: a honeypot study of the LDAP and log4j attack landscape.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

A Bad IDEa: Weaponizing uncontrolled online-IDEs in availability attacks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

Is Your Password Sexist? a Gamification-Based Analysis of the Cultural Context of Leaked Passwords.
Proceedings of the Computer Security - ESORICS 2022, 2022

Detecting DNS hijacking by using NetFlow data.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

Interaction matters: a comprehensive analysis and a dataset of hybrid IoT/OT honeypots.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection.
ACM Trans. Priv. Secur., 2021

COVID-19 vaccination certificates in the Darkweb.
CoRR, 2021

Gotta catch 'em all: a Multistage Framework for honeypot fingerprinting.
CoRR, 2021

Using NetFlow to Measure the Impact of Deploying DNS-based Blacklists.
Proceedings of the Security and Privacy in Communication Networks, 2021

Open for hire: attack trends and misconfiguration pitfalls of IoT devices.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

A qualitative mapping of Darkweb marketplaces.
Proceedings of the APWG Symposium on Electronic Crime Research, 2021

An uneven game of hide and seek: Hiding botnet CnC by encrypting IPs in DNS records.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

2020
Towards systematic honeytoken fingerprinting.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020

TRIDEnT: towards a decentralized threat indicator marketplace.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Visualizing the Bitcoin's OP_RETURN operator.
Proceedings of the Mobihoc '20: The Twenty-first ACM International Symposium on Theory, 2020

ethVote: Towards secure voting with distributed ledgers.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

Cyber-security research by ISPs: A NetFlow and DNS Anonymization Policy.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

2019
Detection and mitigation of monitor identification attacks in collaborative intrusion detection systems.
Int. J. Netw. Manag., 2019

Network entity characterization and attack prediction.
Future Gener. Comput. Syst., 2019

TRIDEnT: Building Decentralized Incentives for Collaborative Security.
CoRR, 2019

Autonomously detecting sensors in fully distributed botnets.
Comput. Secur., 2019

Assessing the Threat of Blockchain-based Botnets.
Proceedings of the 2019 APWG Symposium on Electronic Crime Research, 2019

Poster: Challenges of Accurately Measuring Churn in P2P Botnets.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Sphinx: a Colluder-Resistant Trust Mechanism for Collaborative Intrusion Detection.
IEEE Access, 2018

Next Generation P2P Botnets: Monitoring Under Adverse Conditions.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Don't steal my drone: Catching attackers with an unmanned aerial vehicle honeypot.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

HoneyDrone: A medium-interaction unmanned aerial vehicle honeypot.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

2017
I Trust my Zombies: A Trust-enabled Botnet.
CoRR, 2017

Defending against Probe-Response Attacks.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions.
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017

Towards Blockchain-Based Collaborative Intrusion Detection Systems.
Proceedings of the Critical Information Infrastructures Security, 2017

2016
On Collaborative Intrusion Detection.
PhD thesis, 2016

Multi-stage attack detection and signature generation with ICS honeypots.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Towards the creation of synthetic, yet realistic, intrusion detection datasets.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

BoobyTrap: On autonomously detecting and characterizing crawlers in P2P botnets.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

On probe-response attacks in Collaborative Intrusion Detection Systems.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
Taxonomy and Survey of Collaborative Intrusion Detection.
ACM Comput. Surv., 2015

On the Security and Privacy of Internet of Things Architectures and Systems.
Proceedings of the 2015 International Workshop on Secure Internet of Things, 2015

A honeypot-driven cyber incident monitor: lessons learned and steps ahead.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

Community-Based Collaborative Intrusion Detection.
Proceedings of the Security and Privacy in Communication Networks, 2015

A survey of technologies for the internet of things.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

SkipMon: A locality-aware Collaborative Intrusion Detection System.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Did you really hack a nuclear power plant? An industrial control mobile honeypot.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Probe-response attacks on collaborative intrusion detection systems: Effectiveness and countermeasures.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

ID2T: A DIY dataset creation toolkit for Intrusion Detection Systems.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
HosTaGe: a Mobile Honeypot for Collaborative Defense.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Security Perspectives for Collaborative Data Acquisition in the Internet of Things.
Proceedings of the Internet of Things. IoT Infrastructures, 2014

2013
This network is infected: HosTaGe - a low-interaction honeypot for mobile devices.
Proceedings of the SPSM'13, 2013


  Loading...