Emmanouil Vasilomanolakis
Emmanouil Vasilomanolakis
Assistant Professor, Aalborg University
Verified email at es.aau.dk - Homepage
Title
Cited by
Cited by
Year
Taxonomy and survey of collaborative intrusion detection
E Vasilomanolakis, S Karuppayah, M Mühlhäuser, M Fischer
ACM Computing Surveys (CSUR) 47 (4), 1-33, 2015
2212015
On the Security and Privacy of Internet of Things Architectures and Systems
E Vasilomanolakis, J Daubert, M Luthra, V Gazis, A Wiesmaier, P Kikiras
International Workshop on Secure Internet of Things (SIoT), 49 - 57, 2015
1162015
A Survey of Technologies for the Internet of Things
V Gazis, M Görtz, M Huber, A Leonardi, K Mathioudakis, A Wiesmaier, ...
International Wireless Communications and Mobile Computing Conference (IWCMC), 2015
1052015
A honeypot-driven cyber incident monitor: lessons learned and steps ahead
E Vasilomanolakis, S Karuppayah, P Kikiras, M Mühlhäuser
Proceedings of the 8th International Conference on Security of Information …, 2015
502015
Towards Blockchain-Based Collaborative Intrusion Detection Systems
N Alexopoulos, E Vasilomanolakis, NR Ivánkó, M Mühlhäuser
International Conference on Critical Information Infrastructures Security, 2017
492017
Multi-stage Attack Detection and Signature Generation with ICS Honeypots
E Vasilomanolakis, S Srinivasa, CG Cordero, M Mühlhäuser
IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies …, 2016
322016
Towards the creation of synthetic, yet realistic, intrusion detection datasets
E Vasilomanolakis, CG Cordero, N Milanov, M Mühlhäuser
IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies …, 2016
272016
ID2T: A DIY dataset creation toolkit for Intrusion Detection Systems
CG Cordero, E Vasilomanolakis, N Milanov, C Koch, D Hausheer, ...
Communications and Network Security (CNS), 739 - 740, 2015
252015
SkipMon: A Locality-Aware Collaborative Intrusion Detection System
E Vasilomanolakis, M Krügl, CG Cordero, M Mühlhäuser, M Fischer
34th International Performance Computing and Communications Conference …, 2015
232015
Network entity characterization and attack prediction
V Bartos, M Zadnik, SM Habib, E Vasilomanolakis
Future Generation Computer Systems, 2019
142019
This network is infected: Hostage-a low-interaction honeypot for mobile devices
E Vasilomanolakis, S Karuppayah, M Fischer, M Mühlhäuser, ...
Proceedings of the Third ACM workshop on Security and privacy in smartphones …, 2013
142013
Did you really hack a nuclear power plant? An industrial control mobile honeypot
E Vasilomanolakis, S Srinivasa, M Muhlhauser
Communications and Network Security (CNS), 729 - 730, 2015
132015
BoobyTrap: On autonomously detecting and characterizing crawlers in P2P botnets
S Karuppayah, E Vasilomanolakis, S Haas, M Mühlhäuser, M Fischer
2016 IEEE International Conference on Communications (ICC), 1-7, 2016
112016
Hostage: a mobile honeypot for collaborative defense
E Vasilomanolakis, S Karuppayah, M Mühlhäuser, M Fischer
Proceedings of the 7th International Conference on Security of Information …, 2014
112014
Next Generation P2P Botnets: Monitoring under Adverse Conditions
L Böck, E Vasilomanolakis, M Mühlhäuser, S Karuppayah
International Symposium on Research in Attacks, Intrusions and Defenses …, 2018
102018
Security Perspectives for Collaborative Data Acquisition in the Internet of Things
V Gazis, CG Cordero, E Vasilomanolakis, P Kikiras, A Wiesmaier
International Conference on Safety and Security in Internet of Things 151 …, 2014
82014
Autonomously detecting sensors in fully distributed botnets
L Böck, E Vasilomanolakis, JH Wolf, M Mühlhäuser
computers & security 83, 1-13, 2019
72019
Challenges and available solutions against organized cyber-crime and terrorist networks
A TUNDIS, F HUBER, B JÄGER, J DAUBERT, E VASILOMANOLAKIS, ...
WIT Transactions on the Built Environment 174, 429-441, 2018
72018
On Probe-Response Attacks in Collaborative Intrusion Detection Systems
E Vasilomanolakis, M Stahn, CG Cordero, M Mühlhäuser
Conference on Communications and Network Security (CNS). IEEE, 279-286, 2016
72016
Community-based Collaborative Intrusion Detection
CG Cordero, E Vasilomanolakis, M Mühlhäuser, M Fischer
International Workshop onApplications and Techniques in Cyber Security (ATCS), 2015
72015
The system can't perform the operation now. Try again later.
Articles 1–20