Emmanouil Vasilomanolakis
Aalborg Universitet
H-index: 18
Europe-Denmark
Top articles of Emmanouil Vasilomanolakis
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
COVID-19 vaccination certificates in the Darkweb | Digital Threats: Research and Practice | Dimitrios Georgoulias Jens Myrup Pedersen Morten Falch Emmanouil Vasilomanolakis | 2023/3/9 |
Botnet business models, takedown attempts, and the darkweb market: A survey | Dimitrios Georgoulias Jens Myrup Pedersen Morten Falch Emmanouil Vasilomanolakis | 2023/2/9 | |
Correction to: A decentralized honeypot for IoT Protocols based on Android devices | International Journal of Information Security | Irini Lygerou Shreyas Srinivasa Emmanouil Vasilomanolakis George Stergiopoulos Dimitris Gritzalis | 2023/2/1 |
SweetCam: an IP Camera Honeypot | Zetong Zhao Shreyas Srinivasa Emmanouil Vasilomanolakis | 2023/11/26 | |
In the market for a Botnet? An in-depth analysis of botnet-related listings on Darkweb marketplaces | Dimitrios Georgoulias Jens Myrup Pedersen Alice Hutchings Morten Falch Emmanouil Vasilomanolakis | 2023 | |
Cheaper than you thought? A dive into the darkweb market of cyber-crime products | Dimitrios Georgoulias Ricardo Yaben Emmanouil Vasilomanolakis | 2023/8/29 | |
An analysis of war impact on Ukrainian critical infrastructure through network measurements | Shreyas Srinivasa Jens Myrup Pedersen Emmanouil Vasilomanolakis Rishabh Singla Narasimha Reddy | 2023/7/1 | |
A decentralized honeypot for IoT Protocols based on Android devices | International Journal of Information Security | Irini Lygerou Shreyas Srinivasa Emmanouil Vasilomanolakis George Stergiopoulos Dimitris Gritzalis | 2022/12 |
Deceptive directories and “vulnerable” logs: a honeypot study of the LDAP and log4j attack landscape | Shreyas Srinivasa Jens Myrup Pedersen Emmanouil Vasilomanolakis | 2022/6/6 | |
Honeysweeper: Towards Stealthy Honeytoken Fingerprinting Techniques | Mohamed Msaad Shreyas Srinivasa Mikkel M Andersen David H Audran Charity U Orji | 2022/11/30 | |
A study on the use of 3rd party DNS resolvers for malware filtering or censorship circumvention | Martin Fejrskov Emmanouil Vasilomanolakis Jens Myrup Pedersen | 2022/6/3 | |
Is your password sexist? A gamification-based analysis of the cultural context of leaked passwords | Daniel Mølmark-O’Connor Emmanouil Vasilomanolakis | 2022 | |
Detecting DNS hijacking by using NetFlow data | Martin Fejrskov Jens Myrup Pedersen Emmanouil Vasilomanolakis | 2022/10/3 | |
Tick Tock Break The Clock: Breaking CAPTCHAs on the darkweb | David Holm Audran Marcus Braunschweig Andersen Mark Højer Hansen Mikkel Møller Andersen Thomas B Thomas | 2022 | |
Processing of botnet tracking data under the GDPR | Computer Law & Security Review | Leon Böck Martin Fejrskov Katerina Demetzou Shankar Karuppayah Max Mühlhäuser | 2022/7/1 |
Interaction matters: a comprehensive analysis and a dataset of hybrid IoT/OT honeypots | Shreyas Srinivasa Jens Myrup Pedersen Emmanouil Vasilomanolakis | 2022/12/5 | |
A Bad IDEa: Weaponizing uncontrolled online-IDEs in availability attacks | Shreyas Srinivasa Dimitrios Georgoulias Jens Myrup Pedersen Emmanouil Vasilomanolakis | 2022/6/6 | |
On generating network traffic datasets with synthetic attacks for intrusion detection | ACM Transactions on Privacy and Security (TOPS) | Carlos Garcia Cordero Emmanouil Vasilomanolakis Aidmar Wainakh Max Mühlhäuser Simin Nadjm-Tehrani | 2021/1/2 |
Open for hire: attack trends and misconfiguration pitfalls of IoT devices | Shreyas Srinivasa Jens Myrup Pedersen Emmanouil Vasilomanolakis | 2021/11/2 | |
Using NetFlow to measure the impact of deploying DNS-based blacklists | Martin Fejrskov Jens Myrup Pedersen Emmanouil Vasilomanolakis | 2021 |