Automatic extraction of indicators of compromise for web applications O Catakoglu, M Balduzzi, D Balzarotti Proceedings of the 25th international conference on world wide web, 333-343, 2016 | 88 | 2016 |
Attacks landscape in the dark side of the web O Catakoglu, M Balduzzi, D Balzarotti Proceedings of the Symposium on Applied Computing, 1739-1746, 2017 | 33 | 2017 |
Uses and abuses of server-side requests G Pellegrino, O Catakoglu, D Balzarotti, C Rossow Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016 | 21 | 2016 |
Uneven key pre-distribution scheme for multi-phase wireless sensor networks O Catakoglu, A Levi Information Sciences and Systems 2013: Proceedings of the 28th International …, 2013 | 8 | 2013 |
Scraping airlines bots: Insights obtained studying honeypot data E Chiapponi, M Dacier, O Catakoglu, O Thonnard, M Todisco International Journal of Cyber Forensics and Advanced Threat Investigations …, 2021 | 5 | 2021 |
HoPLA: a honeypot platform to lure attackers E Chiapponi, O Catakoglu, O Thonnard, M Dacier Computer & Electronics Security Applications Rendez-vous, Deceptive security …, 2020 | 4 | 2020 |
Botnet sizes: when maths meet myths E Chiapponi, M Dacier, M Todisco, O Catakoglu, O Thonnard International Conference on Service-Oriented Computing, 596-611, 2020 | 2 | 2020 |