Harm Griffioen

Orcid: 0009-0006-7990-7802

According to our database1, Harm Griffioen authored at least 13 papers between 2019 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Could you clean up the Internet with a Pit of Tar? Investigating tarpit feasibility on Internet worms.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

How to Operate a Meta-Telescope in your Spare Time.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

2021
SIP Bruteforcing in the Wild - An Assessment of Adversaries, Techniques and Tools.
Proceedings of the IFIP Networking Conference, 2021

Scan, Test, Execute: Adversarial Tactics in Amplification DDoS Attacks.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Analysis and Takeover of the Bitcoin-Coordinated Pony Malware.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
A different cup of TI? The added value of commercial threat intelligence.
Proceedings of the 29th USENIX Security Symposium, 2020

Discovering Collaboration: Unveiling Slow, Distributed Scanners based on Common Header Field Patterns.
Proceedings of the NOMS 2020, 2020

Quantifying TCP SYN DDoS Resilience: A Longitudinal Study of Internet Services.
Proceedings of the 2020 IFIP Networking Conference, 2020

Examining Mirai's Battle over the Internet of Things.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Quality Evaluation of Cyber Threat Intelligence Feeds.
Proceedings of the Applied Cryptography and Network Security, 2020

Quantifying autonomous system IP churn using attack traffic of botnets.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Fingerprinting Tooling used for SSH Compromisation Attempts.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Taxonomy and Adversarial Strategies of Random Subdomain Attacks.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019


  Loading...