Filter
Conference contribution

Search results

  • 2021

    Inside the Matrix: CTI Frameworks as Partial Abstractions of Complex Threats

    Oosthoek, K. & Doerr, C., 2021, 2021 IEEE International Conference on Big Data (Big Data): Proceedings. Piscataway: IEEE, p. 2136-2143 8 p. 9671425

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    285 Downloads (Pure)
  • Scan, Test, Execute: Adversarial Tactics in Amplification DDoS Attacks

    Griffioen, H., Oosthoek, K., van der Knaap, P. & Doerr, C., 2021, CCS 2021 : Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 940-954 15 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    14 Citations (Scopus)
    162 Downloads (Pure)
  • 2020

    From Hodl to Heist: Analysis of Cyber Security Threats to Bitcoin Exchanges

    Oosthoek, K. & Doerr, C., 2020, 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, p. 1-9 9 p. 9169412

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    17 Citations (Scopus)
  • 2019

    SoK: ATT&CK techniques and trends in windows malware

    Oosthoek, K. & Doerr, C., 2019, Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings. Chen, S., Choo, K-K. R., Fu, X., Lou, W. & Mohaisen, A. (eds.). Springer, Vol. 304. p. 406-425 20 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 304 LNICST).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    26 Citations (Scopus)