H. Griffioen and C. Doerr

Could you clean up the Internet with a Pit of Tar? Investigating tarpit feasibility on Internet worms

IEEE Symposium on Security and Privacy 2023
[bibtex]


L. Böck and D. Levin and R. Padmanabhan and C. Doerr and M. Mühlhäuser

How to Count Bots in Longitudinal Datasets of IP Addresses

Network and Distributed System Security (NDSS) 2023
[bibtex]


A. Zivi and C. Doerr

Adding Zero Trust in BYOD Environments through Network Inspection

Cyber Resilience Workshop - IEEE Conference on Communications and Network Security 2022
[bibtex]


V. Ghiette and C. Doerr

Clustering Payloads: Grouping Randomized Scan Probes Into Campaign Templates

IFIP Networking 2022
[bibtex] [pdf]


J. Vos and Z. Erkin and C. Doerr

Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers

IEEE Workshop on Information Forensics and Security 2021
[bibtex]


H. Griffioen and K. Oosthoek and P. v. d. Knaap and C. Doerr

Scan, Test, Execute: Adversarial Tactics in Amplification DDoS Attacks

ACM Conference on Computer and Communications Security (CCS) 2021
[bibtex]


H. Griffioen and H. Hu and C. Doerr

SIP Bruteforcing in the Wild - An Assessment of Adversaries, Techniques and Tools

IFIP Networking 2021
[bibtex]


K. Oosthoek and C. Doerr

Cyber Security Threats to Bitcoin Exchanges: Adversary Exploitation and Laundering Techniques

IEEE Transactions on Network and Service Management 2021
[bibtex] [pdf]


T. Taniguchi and H. Griffioen and C. Doerr

Analysis and Takeover of the Bitcoin-Coordinated Pony Malware

ACM ASIA Conference on Computer and Communications Security (AsiaCCS) 2021
[bibtex] [pdf]


H. Griffioen and C. Doerr

Examining Mirai's Battle over the Internet of Things

ACM Conference on Computer and Communications Security (CCS) 2020
[bibtex] [pdf]


M. A. Siddiqi and C. Doerr and C. Strydis

IMDfence: Architecting a Secure Protocol for Implantable Medical Devices

IEEE Access vol. 8 2020
[bibtex]


X. Bouwman and H. Griffioen and J. Egbers and C. Doerr and B. Klievink and M. v. Eeten

A different cup of TI? The added value of commercial threat intelligence

Usenix Security Symposium 2020
[bibtex] [pdf]


H. Griffioen and C. Doerr

Quantifying Autonomous System IP Churn using Attack Traffic of Botnets

International Conference on Availability, Reliability and Security (ARES) 2020
[bibtex] [pdf]


K. Oosthoek and C. Doerr

Cyber Threat Intelligence: A Product Without a Process?

International Journal of Intelligence and CounterIntelligence 2020
[bibtex] [pdf]


H. Griffioen and C. Doerr

Quantifying TCP SYN DDoS Resilience: A Longitudinal Study of Internet Services

IFIP Networking 2020
[bibtex] [pdf]


V. Ghiette and C. Doerr

Scaling website fingerprinting

IFIP Networking 2020
[bibtex] [pdf]


K. Oosthoek and C. Doerr

From Hodl to Heist: Analysis of Cyber Security Threats to Bitcoin Exchanges

IEEE International Conference on Blockchain and Cryptocurrency 2020
[bibtex] [pdf]


H. Griffioen and T. M. Booij and C. Doerr

Quality Evaluation of Cyber Threat Intelligence Feeds

International Conference on Applied Cryptography and Network Security (ACNS) 2020
[bibtex] [pdf]


H. Griffioen and C. Doerr

Discovering Collaboration: Unveiling Slow, Distributed Scanners based on Common Header Field Patterns

IEEE/IFIP Network Operations and Management Symposium (NOMS) 2020
[bibtex] [pdf]


H. L. Bijmans and T. M. Booij and C. Doerr

Just the Tip of the Iceberg: Internet-Scale Exploitation of Routers for Cryptojacking

ACM Conference on Computer and Communications Security (CCS) 2019
[bibtex] [pdf]


H. L. Bijmans and T. M. Booij and C. Doerr

Inadvertently making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale

Usenix Security Symposium 2019
[bibtex] [pdf]


V. Ghiette and H. Griffioen and C. Doerr

Fingerprinting Tooling used for SSH Compromisation Attempts

International Symposium on Research in Attacks, Intrusions and Defenses (RAID) 2019
[bibtex] [pdf]


K. Oosthoek and C. Doerr

SoK: ATT&CK Techniques in Windows Malware

International Conference on Security and Privacy in Communication Networks (SecureComm) 2019
[bibtex] [pdf]


H. Griffioen and C. Doerr

Taxonomy and Adversarial Strategies of Random Subdomain Attacks

International Conference on New Technologies, Mobility and Security 2019
[bibtex] [pdf]


M. Luchs and C. Doerr

The Curious Case of Port 0

IFIP Networking 2019
[bibtex] [pdf]


V. Ghiette and C. Doerr

How Media Reports Trigger Copycats: An Analysis of the Brewing of the Largest Packet Storm to Date

ACM SIGCOMM Workshop on Traffic Measurements for Cybersecurity (WTMC) 2018
[bibtex] [pdf]


S. Pletinckx and C. Trap and C. Doerr

Malware Coordination using the Blockchain: An Analysis of the Cerber Ransomware

IEEE Conference on Communications and Network Security 2018
[bibtex] [pdf]


X. Yang and E. Karampatzakis and C. Doerr and F. Kuipers

Security Vulnerabilities in LoRaWAN

ACM/IEEE International Conference on Internet-of-Things Design and Implementation 2018
[bibtex] [pdf]



N. Blenn and V. Ghiette and C. Doerr

Quantifying the Spectrum of Denial-of-Service Attacks through Internet Backscatter

International Conference on Availability, Reliability and Security (ARES) 2017
[bibtex] [pdf]


J. Abbink and C. Doerr

Popularity-Based Detection of Domain Generation Algorithms

2nd International Workshop on Malware Analysis 2017
[bibtex] [pdf]


M. A. Prado-Romero and C. Doerr and A. Gago-Alonso

Discovering Bitcoin Mixing Using Anomaly Detection

Iberoamerican Congress on Pattern Recognition (CIARP) 2017
[bibtex]


P. V. Aubel and K. Papagiannopoulos and L. Chmielewski and C. Doerr

Side-channel based intrusion detection for industrial control systems

International Conference on Critical Information Infrastructures Security 2017
[bibtex]


M. Luchs and C. Doerr

Last Line of Defense: A Novel IDS Approach Against Advanced Threats in Industrial Control Systems

International Conference on Detection of Intrusions and Malware & Vulnerability Assessment 2017
[bibtex]


V. Ghiette and N. Blenn and C. Doerr

Remote Identification of Port Scan Toolchains

IFIP International Conference on New Technologies, Mobility and Security 2016
[bibtex] [pdf]


C. Doerr and M. e. Maouchi and S. Kamoen and J. Moree

Scan Prediction and Reconnaissance Mitigation through Commodity Graphics Cards

IEEE Conference on Communications and Network Security 2016
[bibtex] [pdf]


M. v. Wieren and C. Doerr and V. Jacobs and W. Pieters

Understanding bifurcation of slow versus fast cyber-attackers

Fifth International Workshop on Quantitative Aspects of Security Assurance 2016
[bibtex]



C. Doerr and F. Kuipers

All Quiet on the Internet Front?

IEEE Communications Magazine, Special Issue on Disaster Resilience in Communication Networks October 2014
[bibtex]


H. Dantas and Z. Erkin and C. Doerr and R. Hallie and G. V. D. Bij

eFuzz: A fuzzer for DLMS/COSEM electricity meters

ACM SEGS 2014
[bibtex]


N. L. M. v. Adrichem and C. Doerr and F. A. Kuipers

OpenNetMon: Network monitoring in OpenFlow Software-Defined Networks

IEEE/IFIP Network Operations and Management Symposium (NOMS) 2014
[bibtex] [pdf]


C. Doerr

7 Challenges to Effective Resilience Engineering

(Invited Paper)
IEEE SCVT 2014
[bibtex]


C. Doerr and N. Blenn and P. V. Mieghem

Lognormal Infection Times of Online Information Spread

PLoS ONE vol. 8 no. 5 2013
[bibtex]


C. Doerr and N. Blenn

Metric Convergence in Social Network Sampling

ACM Hotplanet 2013
[bibtex]


C. Doerr

Challenge Tracing and Mitigation under Partial Information and Uncertainty

IEEE Symposium on Security Analytics and Automation 2013
[bibtex]


C. Doerr and R. Gavrila and F. Kuipers and P. Trimintzios

Good Practices in Resilient Internet Interconnection

European Network Information and Security Agency 2012
[bibtex]



C. Doerr and N. Blenn and S. Tang and P. V. Mieghem

Are Friends Overrated? A Study for the Social Aggregator Digg.com

Computer Communications vol. 35 no. 7 2012
[bibtex] [pdf]


N. Blenn and C. Doerr and N. Shadravan and P. V. Mieghem

How much do your friends tell about you? Reconstructing private information from the friendship graph

Social Network Systems 2012
[bibtex]


J. M. Hernandez and C. Doerr and M. Schoeller and J. Lessmann

Challenge-aware Traffic Protection in Wireless Mobile Backhaul Networks

Future Heterogeneous Network 2012
[bibtex]


N. Blenn and K. Charalampidou and C. Doerr

Context-Sensitive Sentiment Classification of Short Colloquial Text

IFIP Networking 2012
[bibtex]


N. Blenn and B. v. Kester and C. Doerr and P. V. Mieghem

Crawling and Detecting Community Structure in Online Social Networks using Local Information

IFIP Networking 2012
[bibtex]


S. Tang and N. Blenn and C. Doerr and P. V. Mieghem

Digging in the Digg Social News Website

IEEE Transactions on Multimedia vol. 13 no. 5 2011
[bibtex]


P. V. Mieghem and N. Blenn and C. Doerr

Lognormal distribution in the digg online social network

European Physics Journal B 2011
[bibtex]


C. Doerr and S. Tang and N. Blenn and P. V. Mieghem

Are Friends Overrated? A Study for the Social Aggregator Digg.com

IFIP Networking 2011
[bibtex]


C. Doerr and D. Grunwald and D. Sicker

Swarm Intelligence in Heterogeneous Cognitive Radio Networks

Cognitive Radio Networks: Architectures, Protocols, and Standards 2010
[bibtex]


C. Doerr and D. Grunwald and D. Sicker

Efficient Cross-Layer Optimization in Cognitive Radio Networks

Cognitive Radio Networks: Architectures, Protocols, and Standards 2010
[bibtex]


C. Doerr and J. M. Hernandez

A Computational Approach to Multi-Level Analysis of Network Resilience

International Conference on Dependability (DEPEND) 2010
[bibtex]


C. Doerr and D. Grunwald and D. Sicker

Local Control of Cognitive Radio Networks

Annals of Telecommunication 2009
[bibtex] [pdf]


C. Doerr and P. Smith and D. Hutchison

Network Heterogeneity and Cascading Failures - An Evaluation for the case of BGP Vulnerability

Proceedings of the 4th IFIP TC 6 International Workshop on Self-Organizing Systems (IWSOS) 2009
[bibtex]


C. Doerr and D. Grunwald and D. Sicker

Algorithms for Cognitive Radio Networks

US/DoD - Finland/TEKES collaborative workshop for Issues in Wireless Communication Networking 2008
[bibtex]


C. Doerr and D. Grunwald and D. Sicker

Local Independent Control of Cognitive Radio Networks

3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM) 2008
[bibtex]


C. Doerr and M. Colagrosso and D. Grunwald and D. Sicker

Scalability of Cognitive Radio Control Algorithms

IEEE International Symposium on Wireless Pervasive Computing (ISWPC) 2008
[bibtex]


C. Doerr and D. Grunwald and D. Sicker

Enhancing Cognitive Radio Algorithms Through Efficient, Automatic Adaptation Management

IEEE Vehicular Technology Conference (VTC) 2008
[bibtex]


D. Sicker and C. Doerr

The 700 MHz Auction

(Invited Paper)
Third IEEE Workshop on Networking Technologies for Software-Defined Radio Networks (SDR) 2008
[bibtex]


C. Doerr and D. Grunwald and D. Sicker

Dynamic Control Channel Management in Presence of Spectrum Heterogeneity

IEEE Military Communication Conferences (MILCOM) 2008
[bibtex]


C. Doerr and D. Grunwald and D. Sicker

Dynamic Control Channel Assignment in Cognitive Radio Networks using Swarm Intelligence

IEEE Global Communication Conference (GLOBECOM) 2008
[bibtex]


C. Doerr and D. v. Dincklage and A. Diwan

Simplifying Web Traversals By Recognizing Behavior Patterns

Eighteenth ACM Conference on Hypertext and Hypermedia (HT) 2007
[bibtex] [pdf]


T. W. Rondeau and A. B. MacKenzie and C. W. Bostian and K. E. Nolan and L. Doyle and C. Doerr and D. Grunwald and G. J. Minden and J. B. Evans

International Collaboration for a Cognitive Radio Testbed

Proceedings of Software-Defined Radio Technical Forum (SDR Conference) 2007
[bibtex]


C. Doerr and D. Sicker and D. Grunwald

Optimizing for Sparse Training of Cognitive Radio Networks

First International Workshop on Cognitive Wireless Networks (CWNets) 2007
[bibtex]


C. Doerr and D. Sicker and D. Grunwald

What a Cognitive Radio Network Can Learn from a School of Fish

Third Annual Wireless Internet Conference (WICON) 2007
[bibtex]


C. Doerr and D. Sicker and D. Grunwald

Experiences Implementing Cognitive Radio Control Algorithms

(Invited Paper)
Proceedings of IEEE Globecom 2007 Wireless Communications 2007
[bibtex]


A. Sheth and C. Doerr and D. Grunwald and R. Han and D. Sicker

MOJO: A Distributed Physical Layer Anomaly Detection System for 802.11 WLANs

Fourth International Conference on Mobile Systems, Applications, and Services (MobiSys) 2006
[bibtex]


C. Doerr and A. Diwan and M. Jackson

Generalizing the PL-Detective: The Knowledge Discovery Framework

11th Annual World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education (E-Learn) 2006
[bibtex]


D. Sicker and D. Grunwald and E. Anderson and C. Doerr and A. Sheth and B. Munsinger

Examining the Wireless Commons

Telecommunications Policy Research Conference (TPRC) 2006
[bibtex]


C. Doerr and M. Neufeld and J. Fifield and T. Weingart and D. C. Sicker and D. Grunwald

MultiMAC - An Adaptive MAC Framework for Dynamic Radio Networking

First IEEE Symposium on New Frontiers in Dynamic Spectrum Networks (DySPAN) 2005
[bibtex]


M. Neufeld and J. Fifield and C. Doerr and A. Sheth and D. Grunwald

SoftMAC - Flexible Wireless Research Platform

Fourth Workshop on Hot Topics in Networks (HotNets) 2005
[bibtex]