Остановите войну!
for scientists:
default search action
Carlos Gañán
- > Home > Persons > Carlos Gañán
Publications
- 2023
- [c46]Mathew Vermeer, Natalia Kadenko, Michel van Eeten, Carlos Gañán, Simon Parkin:
Alert Alchemy: SOC Workflows and Decisions in the Management of NIDS Rules. CCS 2023: 2770-2784 - [c39]Arwa Abdulkarim Al Alsadi, Kaichi Sameshima, Katsunari Yoshioka, Michel van Eeten, Carlos Hernandez Gañán:
Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries. RAID 2023: 513-526 - [c38]Lorenz Kustosch, Carlos Gañán, Mattis van 't Schip, Michel van Eeten, Simon Parkin:
Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical Basis for Holding IoT Manufacturers Legally Responsible. USENIX Security Symposium 2023: 1487-1504 - [c37]Swaathi Vetrivel, Veerle van Harten, Carlos Hernandez Gañán, Michel van Eeten, Simon Parkin:
Examining Consumer Reviews to Understand Security and Privacy Issues in the Market of Smart Home Devices. USENIX Security Symposium 2023: 1523-1540 - [c36]Elsa Turcios Rodriguez, Radu Anghel, Simon Parkin, Michel van Eeten, Carlos Gañán:
Two Sides of the Shield: Understanding Protective DNS adoption factors. USENIX Security Symposium 2023: 3135-3152 - [i7]Veerle van Harten, Carlos Hernandez Gañán, Michel van Eeten, Simon Parkin:
Easier Said Than Done: The Failure of Top-Level Cybersecurity Advice for Consumer IoT Devices. CoRR abs/2310.00942 (2023) - 2022
- [j15]Rui Tanabe, Tsuyufumi Watanabe, Akira Fujita, Ryoichi Isawa, Carlos Gañán, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto:
Disposable Botnets: Long-term Analysis of IoT Botnet Infrastructure. J. Inf. Process. 30: 577-590 (2022) - [c35]Arwa Abdulkarim Al Alsadi, Kaichi Sameshima, Jakob Bleier, Katsunari Yoshioka, Martina Lindorfer, Michel van Eeten, Carlos Hernandez Gañán:
No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis. AsiaCCS 2022: 309-321 - [c34]Mathew Vermeer, Michel van Eeten, Carlos Gañán:
Ruling the Rules: Quantifying the Evolution of Rulesets, Alerts and Incidents in Network Intrusion Detection. AsiaCCS 2022: 799-814 - [c33]Elsa Turcios Rodriguez, Max Fukkink, Simon Parkin, Michel van Eeten, Carlos Gañán:
Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware. EuroS&P 2022: 392-409 - [c32]Qasim Lone, Alisa Frik, Matthew Luckie, Maciej Korczynski, Michel van Eeten, Carlos Gañán:
Deployment of Source Address Validation by Network Operators: A Randomized Control Trial. SP 2022: 2361-2378 - [c31]Takayuki Sasaki, Akira Fujita, Carlos Hernandez Gañán, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto:
Exposed Infrastructures: Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices. SP 2022: 2379-2396 - [c30]Xander Bouwman, Victor Le Pochat, Pawel Foremski, Tom van Goethem, Carlos Hernandez Gañán, Giovane C. M. Moura, Samaneh Tajalizadehkhoob, Wouter Joosen, Michel van Eeten:
Helping hands: Measuring the impact of a large threat intelligence sharing community. USENIX Security Symposium 2022: 1149-1165 - [i6]Elsa Turcios Rodriguez, Max Fukkink, Simon Parkin, Michel van Eeten, Carlos Gañán:
Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware. CoRR abs/2203.01683 (2022) - 2021
- [j14]Elsa Turcios Rodriguez, Susanne Verstegen, Arman Noroozian, Daisuke Inoue, Takahiro Kasama, Michel van Eeten, Carlos Hernandez Gañán:
User compliance and remediation success after IoT malware notifications. J. Cybersecur. 7(1) (2021) - [c29]Arman Noroozian, Elsa Turcios Rodriguez, Elmer Lastdrager, Takahiro Kasama, Michel van Eeten, Carlos Gañán:
Can ISPs Help Mitigate IoT Malware? A Longitudinal Study of Broadband ISP Security Efforts. EuroS&P 2021: 337-352 - [c28]Mathew Vermeer, Jonathan West, Alejandro Cuevas, Shuonan Niu, Nicolas Christin, Michel van Eeten, Tobias Fiebig, Carlos Gañán, Tyler Moore:
SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations. EuroS&P 2021: 440-456 - [c26]Brennen Bouwmeester, Elsa Turcios Rodriguez, Carlos Gañán, Michel van Eeten, Simon Parkin:
"The Thing Doesn't Have a Name": Learning from Emergent Real-World Interventions in Smart Home Security. SOUPS @ USENIX Security Symposium 2021: 493-512 - 2020
- [j13]Takayuki Sasaki, Carlos Hernandez Gañán, Katsunari Yoshioka, Michel van Eeten, Tsutomu Matsumoto:
Pay the Piper: DDoS Mitigation Technique to Deter Financially-Motivated Attackers. IEICE Trans. Commun. 103-B(4): 389-404 (2020) - [c24]Rui Tanabe, Tatsuya Tamai, Akira Fujita, Ryoichi Isawa, Katsunari Yoshioka, Tsutomu Matsumoto, Carlos Gañán, Michel van Eeten:
Disposable botnets: examining the anatomy of IoT botnet infrastructure. ARES 2020: 7:1-7:10 - 2019
- [c22]Orçun Çetin, Carlos Gañán, Lisette Altena, Samaneh Tajalizadehkhoob, Michel van Eeten:
Tell Me You Fixed It: Evaluating Vulnerability Notifications via Quarantine Networks. EuroS&P 2019: 326-339 - [c21]Shun Morishita, Takuya Hoizumi, Wataru Ueno, Rui Tanabe, Carlos Gañán, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto:
Detect Me If You... Oh Wait. An Internet-Wide View of Self-Revealing Honeypots. IM 2019: 134-143 - [c20]Orçun Çetin, Carlos Gañán, Lisette Altena, Takahiro Kasama, Daisuke Inoue, Kazuki Tamiya, Ying Tie, Katsunari Yoshioka, Michel van Eeten:
Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai. NDSS 2019 - [c19]Arman Noroozian, Jan Koenders, Eelco van Veldhuizen, Carlos Hernandez Gañán, Sumayah A. Alrwais, Damon McCoy, Michel van Eeten:
Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting. USENIX Security Symposium 2019: 1341-1356 - 2018
- [j12]Samaneh Tajalizadehkhoob, Rainer Böhme, Carlos Gañán, Maciej Korczynski, Michel van Eeten:
Rotten Apples or Bad Harvest? What We Are Measuring When We Are Measuring Abuse. ACM Trans. Internet Techn. 18(4): 49:1-49:25 (2018) - [c18]Orçun Çetin, Carlos Gañán, Lisette Altena, Samaneh Tajalizadehkhoob, Michel van Eeten:
Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens. SOUPS @ USENIX Security Symposium 2018: 251-263 - [c17]Rolf van Wegberg, Samaneh Tajalizadehkhoob, Kyle Soska, Ugur Akyazi, Carlos Hernandez Gañán, Bram Klievink, Nicolas Christin, Michel van Eeten:
Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets. USENIX Security Symposium 2018: 1009-1026 - 2017
- [j11]Mohammad Hanif Jhaveri, Orçun Çetin, Carlos Gañán, Tyler Moore, Michel van Eeten:
Abuse Reporting and the Fight Against Cybercrime. ACM Comput. Surv. 49(4): 68:1-68:27 (2017) - [c16]Samaneh Tajalizadehkhoob, Carlos Gañán, Arman Noroozian, Michel van Eeten:
The Role of Hosting Providers in Fighting Command and Control Infrastructure of Financial Malware. AsiaCCS 2017: 575-586 - [c15]Carlos Hernandez Gañán, Michael Ciere, Michel van Eeten:
Beyond the pretty penny: the Economic Impact of Cybercrime. NSPW 2017: 35-45 - [c14]Michael Ciere, Carlos Gañán, Michel van Eeten:
Partial Device Fingerprints. ECML/PKDD (2) 2017: 222-237 - [i1]Samaneh Tajalizadehkhoob, Rainer Böhme, Carlos Gañán, Maciej Korczynski, Michel van Eeten:
Rotten Apples or Bad Harvest? What We Are Measuring When We Are Measuring Abuse. CoRR abs/1702.01624 (2017) - 2016
- [j10]Orçun Çetin, Mohammad Hanif Jhaveri, Carlos Gañán, Michel van Eeten, Tyler Moore:
Understanding the role of sender reputation in abuse reporting and cleanup. J. Cybersecur. 2(1): 83-98 (2016) - [c13]Samaneh Tajalizadehkhoob, Maciej Korczynski, Arman Noroozian, Carlos Gañán, Michel van Eeten:
Apples, oranges and hosting providers: Heterogeneity and security in the hosting market. NOMS 2016: 289-297 - [c12]Arman Noroozian, Maciej Korczynski, Carlos Hernandez Gañán, Daisuke Makita, Katsunari Yoshioka, Michel van Eeten:
Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service. RAID 2016: 368-389 - 2015
- [c11]Carlos Gañán, Orçun Çetin, Michel van Eeten:
An Empirical Analysis of ZeuS C&C Lifetime. AsiaCCS 2015: 97-108 - [c10]Giovane C. M. Moura, Carlos Gañán, Qasim Lone, Payam Poursaied, Hadi Asghari, Michel van Eeten:
How dynamic is the ISPs address space? Towards internet-wide DHCP churn estimation. Networking 2015: 1-9 - [c9]Orçun Çetin, Mohammad Hanif Jhaveri, Carlos Gañán, Michel van Eeten, Tyler Moore:
Understanding the Role of Sender Reputation in Abuse Reporting and Cleanup. WEIS 2015
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-21 18:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint