default search action
Emmanouil Vasilomanolakis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c46]Abdirisaq Farah, Martin Nielsen, Emmanouil Vasilomanolakis:
Improving Synthetic Network Attack Traffic Generation. EuroS&P Workshops 2024: 326-334 - [c45]Ricardo Yaben, Niels Lundsgaard, Jacob August, Emmanouil Vasilomanolakis:
Towards Identifying Neglected, Obsolete, and Abandoned IoT and OT Devices. TMA 2024: 1-10 - 2023
- [j10]Dimitrios Georgoulias, Jens Myrup Pedersen, Morten Falch, Emmanouil Vasilomanolakis:
Botnet Business Models, Takedown Attempts, and the Darkweb Market: A Survey. ACM Comput. Surv. 55(11): 219:1-219:39 (2023) - [j9]Irini Lygerou, Shreyas Srinivasa, Emmanouil Vasilomanolakis, George Stergiopoulos, Dimitris Gritzalis:
Correction to: A decentralized honeypot for IoT Protocols based on Android devices. Int. J. Inf. Sec. 22(1): 303 (2023) - [c44]Dimitrios Georgoulias, Ricardo Yaben, Emmanouil Vasilomanolakis:
Cheaper than you thought? A dive into the darkweb market of cyber-crime products. ARES 2023: 106:1-106:10 - [c43]Zetong Zhao, Shreyas Srinivasa, Emmanouil Vasilomanolakis:
SweetCam: an IP Camera Honeypot. CPSIOTSEC@CCS 2023: 75-81 - [c42]Dimitrios Georgoulias, Jens Myrup Pedersen, Alice Hutchings, Morten Falch, Emmanouil Vasilomanolakis:
In the Market for a Botnet? An In-Depth Analysis of Botnet-Related Listings on Darkweb Marketplaces. eCrime 2023: 1-14 - [c41]Rishabh Singla, Shreyas Srinivasa, A. L. Narasimha Reddy, Jens Myrup Pedersen, Emmanouil Vasilomanolakis, Riccardo Bettati:
An Analysis of War Impact on Ukrainian Critical Infrastructure Through Network Measurements. TMA 2023: 1-10 - 2022
- [j8]Leon Böck, Martin Fejrskov, Katerina Demetzou, Shankar Karuppayah, Max Mühlhäuser, Emmanouil Vasilomanolakis:
Processing of botnet tracking data under the GDPR. Comput. Law Secur. Rev. 45: 105652 (2022) - [j7]Irini Lygerou, Shreyas Srinivasa, Emmanouil Vasilomanolakis, George Stergiopoulos, Dimitris Gritzalis:
A decentralized honeypot for IoT Protocols based on Android devices. Int. J. Inf. Sec. 21(6): 1211-1222 (2022) - [c40]Shreyas Srinivasa, Jens Myrup Pedersen, Emmanouil Vasilomanolakis:
Interaction matters: a comprehensive analysis and a dataset of hybrid IoT/OT honeypots. ACSAC 2022: 742-755 - [c39]Martin Fejrskov, Jens Myrup Pedersen, Emmanouil Vasilomanolakis:
Detecting DNS hijacking by using NetFlow data. CNS 2022: 273-280 - [c38]Daniel Mølmark-O'Connor, Emmanouil Vasilomanolakis:
Is Your Password Sexist? a Gamification-Based Analysis of the Cultural Context of Leaked Passwords. ESORICS (3) 2022: 743-748 - [c37]Shreyas Srinivasa, Dimitrios Georgoulias, Jens Myrup Pedersen, Emmanouil Vasilomanolakis:
A Bad IDEa: Weaponizing uncontrolled online-IDEs in availability attacks. EuroS&P Workshops 2022: 82-92 - [c36]Shreyas Srinivasa, Jens Myrup Pedersen, Emmanouil Vasilomanolakis:
Deceptive directories and "vulnerable" logs: a honeypot study of the LDAP and log4j attack landscape. EuroS&P Workshops 2022: 442-447 - [c35]Mohamed Msaad, Shreyas Srinivasa, Mikkel Møller Andersen, David Holm Audran, Charity U. Orji, Emmanouil Vasilomanolakis:
Honeysweeper: Towards Stealthy Honeytoken Fingerprinting Techniques. NordSec 2022: 101-119 - [c34]Martin Fejrskov, Emmanouil Vasilomanolakis, Jens Myrup Pedersen:
A Study on the Use of 3rd Party DNS Resolvers for Malware Filtering or Censorship Circumvention. SEC 2022: 109-125 - [c33]David Holm Audran, Marcus Braunschweig Andersen, Mark Højer Hansen, Mikkel Møller Andersen, Thomas B. Frederiksen, Kasper H. Hansen, Dimitrios Georgoulias, Emmanouil Vasilomanolakis:
Tick Tock Break the Clock: Breaking CAPTCHAs on the Darkweb. SECRYPT 2022: 357-365 - 2021
- [j6]Carlos Garcia Cordero, Emmanouil Vasilomanolakis, Aidmar Wainakh, Max Mühlhäuser, Simin Nadjm-Tehrani:
On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection. ACM Trans. Priv. Secur. 24(2): 8:1-8:39 (2021) - [c32]Martin Fejrskov, Jens Myrup Pedersen, Leon Böck, Emmanouil Vasilomanolakis:
An uneven game of hide and seek: Hiding botnet CnC by encrypting IPs in DNS records. CNS 2021: 164-172 - [c31]Dimitrios Georgoulias, Jens Myrup Pedersen, Morten Falch, Emmanouil Vasilomanolakis:
A qualitative mapping of Darkweb marketplaces. eCrime 2021: 1-15 - [c30]Shreyas Srinivasa, Jens Myrup Pedersen, Emmanouil Vasilomanolakis:
Open for hire: attack trends and misconfiguration pitfalls of IoT devices. Internet Measurement Conference 2021: 195-215 - [c29]Martin Fejrskov, Jens Myrup Pedersen, Emmanouil Vasilomanolakis:
Using NetFlow to Measure the Impact of Deploying DNS-based Blacklists. SecureComm (1) 2021: 476-496 - [i6]Shreyas Srinivasa, Jens Myrup Pedersen, Emmanouil Vasilomanolakis:
Gotta catch 'em all: a Multistage Framework for honeypot fingerprinting. CoRR abs/2109.10652 (2021) - [i5]Dimitrios Georgoulias, Jens Myrup Pedersen, Morten Falch, Emmanouil Vasilomanolakis:
COVID-19 vaccination certificates in the Darkweb. CoRR abs/2111.12472 (2021) - 2020
- [c28]Martin Fejrskov, Jens Myrup Pedersen, Emmanouil Vasilomanolakis:
Cyber-security research by ISPs: A NetFlow and DNS Anonymization Policy. Cyber Security 2020: 1-8 - [c27]Johannes Mols, Emmanouil Vasilomanolakis:
ethVote: Towards secure voting with distributed ledgers. Cyber Security 2020: 1-8 - [c26]Johannes Mols, Emmanouil Vasilomanolakis:
Visualizing the Bitcoin's OP_RETURN operator. MobiHoc 2020: 305-306 - [c25]Nikolaos Alexopoulos, Emmanouil Vasilomanolakis, Stéphane Le Roux, Steven Rowe, Max Mühlhäuser:
TRIDEnT: towards a decentralized threat indicator marketplace. SAC 2020: 332-341 - [c24]Shreyas Srinivasa, Jens Myrup Pedersen, Emmanouil Vasilomanolakis:
Towards systematic honeytoken fingerprinting. SIN 2020: 28:1-28:5
2010 – 2019
- 2019
- [j5]Leon Böck, Emmanouil Vasilomanolakis, Jan Helge Wolf, Max Mühlhäuser:
Autonomously detecting sensors in fully distributed botnets. Comput. Secur. 83: 1-13 (2019) - [j4]Václav Bartos, Martin Zádník, Sheikh Mahbub Habib, Emmanouil Vasilomanolakis:
Network entity characterization and attack prediction. Future Gener. Comput. Syst. 97: 674-686 (2019) - [j3]Emmanouil Vasilomanolakis, Max Mühlhäuser:
Detection and mitigation of monitor identification attacks in collaborative intrusion detection systems. Int. J. Netw. Manag. 29(2) (2019) - [c23]Leon Böck, Shankar Karuppayah, Kory Fong, Max Mühlhäuser, Emmanouil Vasilomanolakis:
Poster: Challenges of Accurately Measuring Churn in P2P Botnets. CCS 2019: 2661-2663 - [c22]Leon Böck, Nikolaos Alexopoulos, Emine Saracoglu, Max Mühlhäuser, Emmanouil Vasilomanolakis:
Assessing the Threat of Blockchain-based Botnets. eCrime 2019: 1-11 - [i4]Carlos Garcia Cordero, Emmanouil Vasilomanolakis, Aidmar Wainakh, Max Mühlhäuser, Simin Nadjm-Tehrani:
On generating network traffic datasets with synthetic attacks for intrusion detection. CoRR abs/1905.00304 (2019) - [i3]Nikolaos Alexopoulos, Emmanouil Vasilomanolakis, Stéphane Le Roux, Steven Rowe, Max Mühlhäuser:
TRIDEnT: Building Decentralized Incentives for Collaborative Security. CoRR abs/1905.03571 (2019) - [i2]Václav Bartos, Martin Zádník, Sheikh Mahbub Habib, Emmanouil Vasilomanolakis:
Network entity characterization and attack prediction. CoRR abs/1909.07694 (2019) - 2018
- [j2]Carlos Garcia Cordero, Giulia Traverso, Mehrdad Nojoumian, Sheikh Mahbub Habib, Max Mühlhäuser, Johannes Buchmann, Emmanouil Vasilomanolakis:
Sphinx: a Colluder-Resistant Trust Mechanism for Collaborative Intrusion Detection. IEEE Access 6: 72427-72438 (2018) - [c21]Jörg Daubert, Dhanasekar Boopalan, Max Mühlhäuser, Emmanouil Vasilomanolakis:
HoneyDrone: A medium-interaction unmanned aerial vehicle honeypot. NOMS 2018: 1-6 - [c20]Emmanouil Vasilomanolakis, Jörg Daubert, Dhanasekar Boopalan, Max Mühlhäuser:
Don't steal my drone: Catching attackers with an unmanned aerial vehicle honeypot. NOMS 2018: 1-2 - [c19]Leon Böck, Emmanouil Vasilomanolakis, Max Mühlhäuser, Shankar Karuppayah:
Next Generation P2P Botnets: Monitoring Under Adverse Conditions. RAID 2018: 511-531 - 2017
- [c18]Nikolaos Alexopoulos, Emmanouil Vasilomanolakis, Natália Réka Ivánkó, Max Mühlhäuser:
Towards Blockchain-Based Collaborative Intrusion Detection Systems. CRITIS 2017: 107-118 - [c17]Emmanouil Vasilomanolakis, Sheikh Mahbub Habib, Pavlos Milaszewicz, Rabee Sohail Malik, Max Mühlhäuser:
Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions. IFIPTM 2017: 94-109 - [c16]Emmanouil Vasilomanolakis, Noorulla Sharief, Max Mühlhäuser:
Defending against Probe-Response Attacks. IM 2017: 1046-1051 - [i1]Emmanouil Vasilomanolakis, Jan Helge Wolf, Leon Böck, Shankar Karuppayah, Max Mühlhäuser:
I Trust my Zombies: A Trust-enabled Botnet. CoRR abs/1712.03713 (2017) - 2016
- [b1]Emmanouil Vasilomanolakis:
On Collaborative Intrusion Detection. Darmstadt University of Technology, Germany, 2016, pp. 1-205 - [c15]Emmanouil Vasilomanolakis, Michael Stahn, Carlos Garcia Cordero, Max Mühlhäuser:
On probe-response attacks in Collaborative Intrusion Detection Systems. CNS 2016: 279-286 - [c14]Shankar Karuppayah, Emmanouil Vasilomanolakis, Steffen Haas, Max Mühlhäuser, Mathias Fischer:
BoobyTrap: On autonomously detecting and characterizing crawlers in P2P botnets. ICC 2016: 1-7 - [c13]Emmanouil Vasilomanolakis, Carlos Garcia Cordero, Nikolay Milanov, Max Mühlhäuser:
Towards the creation of synthetic, yet realistic, intrusion detection datasets. NOMS 2016: 1209-1214 - [c12]Emmanouil Vasilomanolakis, Shreyas Srinivasa, Carlos Garcia Cordero, Max Mühlhäuser:
Multi-stage attack detection and signature generation with ICS honeypots. NOMS 2016: 1227-1232 - 2015
- [j1]Emmanouil Vasilomanolakis, Shankar Karuppayah, Max Mühlhäuser, Mathias Fischer:
Taxonomy and Survey of Collaborative Intrusion Detection. ACM Comput. Surv. 47(4): 55:1-55:33 (2015) - [c11]Emmanouil Vasilomanolakis, Michael Stahn, Carlos Garcia Cordero, Max Mühlhäuser:
Probe-response attacks on collaborative intrusion detection systems: Effectiveness and countermeasures. CNS 2015: 699-700 - [c10]Emmanouil Vasilomanolakis, Shreyas Srinivasa, Max Mühlhäuser:
Did you really hack a nuclear power plant? An industrial control mobile honeypot. CNS 2015: 729-730 - [c9]Carlos Garcia Cordero, Emmanouil Vasilomanolakis, Nikolay Milanov, Christian Koch, David Hausheer, Max Mühlhäuser:
ID2T: A DIY dataset creation toolkit for Intrusion Detection Systems. CNS 2015: 739-740 - [c8]Emmanouil Vasilomanolakis, Matthias Krugl, Carlos Garcia Cordero, Max Mühlhäuser, Mathias Fischer:
SkipMon: A locality-aware Collaborative Intrusion Detection System. IPCCC 2015: 1-8 - [c7]Vangelis Gazis, Manuel Görtz, Marco F. Huber, Alessandro Leonardi, Kostas Mathioudakis, Alexander Wiesmaier, Florian Zeiger, Emmanouil Vasilomanolakis:
A survey of technologies for the internet of things. IWCMC 2015: 1090-1095 - [c6]Carlos Garcia Cordero, Emmanouil Vasilomanolakis, Max Mühlhäuser, Mathias Fischer:
Community-Based Collaborative Intrusion Detection. SecureComm 2015: 665-681 - [c5]Emmanouil Vasilomanolakis, Shankar Karuppayah, Panayotis Kikiras, Max Mühlhäuser:
A honeypot-driven cyber incident monitor: lessons learned and steps ahead. SIN 2015: 158-164 - [c4]Emmanouil Vasilomanolakis, Jörg Daubert, Manisha Luthra, Vangelis Gazis, Alexander Wiesmaier, Panayotis Kikiras:
On the Security and Privacy of Internet of Things Architectures and Systems. SIoT 2015: 49-57 - 2014
- [c3]Vangelis Gazis, Carlos Garcia Cordero, Emmanouil Vasilomanolakis, Panayotis Kikiras, Alexander Wiesmaier:
Security Perspectives for Collaborative Data Acquisition in the Internet of Things. IoT360 (2) 2014: 271-282 - [c2]Emmanouil Vasilomanolakis, Shankar Karuppayah, Max Mühlhäuser, Mathias Fischer:
HosTaGe: a Mobile Honeypot for Collaborative Defense. SIN 2014: 330 - 2013
- [c1]Emmanouil Vasilomanolakis, Shankar Karuppayah, Mathias Fischer, Max Mühlhäuser, Mihai Plasoianu, Lars Pandikow, Wulf Pfeiffer:
This network is infected: HosTaGe - a low-interaction honeypot for mobile devices. SPSM@CCS 2013: 43-48
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint