If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2021

    Scan, Test, Execute: Adversarial Tactics in Amplification DDoS Attacks

    Griffioen, H., Oosthoek, K., van der Knaap, P. & Doerr, C., 2021, CCS 2021 : Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. New York: Association for Computing Machinery (ACM), p. 940-954 15 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    10 Citations (Scopus)
    102 Downloads (Pure)
  • 2020

    Discovering Collaboration: Unveiling Slow, Distributed Scanners based on Common Header Field Patterns

    Griffioen, H. & Doerr, C., 2020, NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium: Proceedings. IEEE , p. 1-9 9 p. 9110444

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    13 Citations (Scopus)
  • Quality Evaluation of Cyber Threat Intelligence Feeds

    Griffioen, H., Booij, T. & Doerr, C., 2020, Applied Cryptography and Network Security. Conti, M., Zhou, J., Casalicchio, E. & Spognardi, A. (eds.). Part II ed. Cham: Springer, p. 277-296 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12147 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    20 Citations (Scopus)
  • 2019

    Designing a Cognitive Agent Connector for Complex Environments: A Case Study with StarCraft

    Koeman, V. J., Griffioen, H. J., Plenge, D. C. & Hindriks, K. V., 2019, Engineering Multi-Agent Systems : 6th International Workshop, EMAS 2018, Revised Selected Papers. Mascardi, V., Weyns, D. & Ricci, A. (eds.). Cham: Springer, p. 302-319 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11375 LNAI).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Fingerprinting tooling used for SSH compromisation attempts

    Ghiëtte, V., Griffioen, H. & Doerr, C., 2019, RAID 2019 Proceedings : 22nd International Symposium on Research in Attacks, Intrusions and Defenses. USENIX Association, p. 61-71 11 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    9 Citations (Scopus)
    35 Downloads (Pure)
  • Taxonomy and adversarial strategies of random subdomain attacks

    Griffioen, H. & Doerr, C., 2019, 2019 10th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2019 - Proceedings and Workshop: Proceedings. Piscataway: IEEE , p. 1-5 5 p. 8763820. (2019 10th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2019 - Proceedings and Workshop).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)