Name
Affiliation
Papers
EMMANOUIL VASILOMANOLAKIS
Technische Universität Darmstadt - CASED, Darmstadt, Germany
36
Collaborators
Citations 
PageRank 
58
109
15.20
Referers 
Referees 
References 
272
447
237
Search Limit
100447
Title
Citations
PageRank
Year
Open for hire: attack trends and misconfiguration pitfalls of IoT devices10.362021
An uneven game of hide and seek: Hiding botnet CnC by encrypting IPs in DNS records00.342021
Using NetFlow to Measure the Impact of Deploying DNS-based Blacklists00.342021
ethVote: Towards secure voting with distributed ledgers00.342020
Towards systematic honeytoken fingerprinting.00.342020
Cyber-security research by ISPs: A NetFlow and DNS Anonymization Policy00.342020
Visualizing the Bitcoin's OP_RETURN operator00.342020
TRIDEnT: towards a decentralized threat indicator marketplace00.342020
Detection and mitigation of monitor identification attacks in collaborative intrusion detection systems00.342019
Autonomously detecting sensors in fully distributed botnets.00.342019
Poster: Challenges of Accurately Measuring Churn in P2P Botnets00.342019
On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection10.342019
Network entity characterization and attack prediction00.342019
TRIDEnT: Building Decentralized Incentives for Collaborative Security.00.342019
Assessing the Threat of Blockchain-based Botnets00.342019
Don't steal my drone: Catching attackers with an unmanned aerial vehicle honeypot.00.342018
Sphinx: a Colluder-Resistant Trust Mechanism for Collaborative Intrusion Detection.00.342018
HoneyDrone: A medium-interaction unmanned aerial vehicle honeypot.00.342018
Defending against Probe-Response Attacks.00.342017
I Trust my Zombies: A Trust-enabled Botnet.00.342017
Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions.00.342017
On probe-response attacks in Collaborative Intrusion Detection Systems.00.342016
Towards the creation of synthetic, yet realistic, intrusion detection datasets.10.352016
Boobytrap: On Autonomously Detecting And Characterizing Crawlers In P2p Botnets30.442016
Multi-stage attack detection and signature generation with ICS honeypots.10.342016
Probe-response attacks on collaborative intrusion detection systems: Effectiveness and countermeasures10.362015
ID2T: A DIY dataset creation toolkit for Intrusion Detection Systems10.362015
Community-Based Collaborative Intrusion Detection.20.382015
Taxonomy and Survey of Collaborative Intrusion Detection591.902015
Did you really hack a nuclear power plant? An industrial control mobile honeypot00.342015
On the Security and Privacy of Internet of Things Architectures and Systems.150.712015
A honeypot-driven cyber incident monitor: lessons learned and steps ahead60.532015
SkipMon: A locality-aware Collaborative Intrusion Detection System.60.462015
Security Perspectives for Collaborative Data Acquisition in the Internet of Things20.502014
HosTaGe: a Mobile Honeypot for Collaborative Defense50.492014
This network is infected: HosTaGe - a low-interaction honeypot for mobile devices50.572013