Follow
Shreyas Srinivasa
Title
Cited by
Cited by
Year
Multi-stage attack detection and signature generation with ICS honeypots
E Vasilomanolakis, S Srinivasa, CG Cordero, M Mühlhäuser
NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 1227-1232, 2016
722016
Open for hire: Attack trends and misconfiguration pitfalls of iot devices
S Srinivasa, JM Pedersen, E Vasilomanolakis
Proceedings of the 21st ACM Internet Measurement Conference, 195-215, 2021
232021
Did you really hack a nuclear power plant? An industrial control mobile honeypot
E Vasilomanolakis, S Srinivasa, M Mühlhäuser
2015 IEEE Conference on Communications and Network Security (CNS), 729-730, 2015
222015
Deceptive directories and “vulnerable” logs: a honeypot study of the LDAP and log4j attack landscape
S Srinivasa, JM Pedersen, E Vasilomanolakis
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2022
152022
Gotta catch’em all: a multistage framework for honeypot fingerprinting
S Srinivasa, JM Pedersen, E Vasilomanolakis
Digital Threats: Research and Practice 4 (3), 1-28, 2023
102023
Towards systematic honeytoken fingerprinting
S Srinivasa, JM Pedersen, E Vasilomanolakis
13th International Conference on Security of Information and Networks, 1-5, 2020
102020
RIoTPot: a modular hybrid-interaction IoT/OT honeypot
S Srinivasa, JM Pedersen, E Vasilomanolakis
Computer Security–ESORICS 2021, 745-751, 2021
72021
Interaction matters: a comprehensive analysis and a dataset of hybrid IoT/OT honeypots
S Srinivasa, JM Pedersen, E Vasilomanolakis
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
62022
A decentralized honeypot for IoT Protocols based on Android devices
I Lygerou, S Srinivasa, E Vasilomanolakis, G Stergiopoulos, D Gritzalis
International Journal of Information Security 21 (6), 1211-1222, 2022
52022
Honeysweeper: Towards Stealthy Honeytoken Fingerprinting Techniques
M Msaad, S Srinivasa, MM Andersen, DH Audran, CU Orji, ...
Nordic Conference on Secure IT Systems, 101-119, 2022
22022
An analysis of war impact on Ukrainian critical infrastructure through network measurements
R Singla, S Srinivasa, N Reddy, JM Pedersen, E Vasilomanolakis, ...
2023 7th Network Traffic Measurement and Analysis Conference (TMA), 1-10, 2023
12023
SweetCam: an IP Camera Honeypot
Z Zhao, S Srinivasa, E Vasilomanolakis
Proceedings of the 5th Workshop on CPS&IoT Security and Privacy, 75-81, 2023
2023
An Analysis of War Impact on Ukrainian Critical Infrastructure Through Network Measurements
S Srinivasa, JM Pedersen, E Vasilomanolakis, R Singla, N Reddy, ...
An Analysis of War Impact on Ukrainian Critical Infrastructure Through …, 2023
2023
Correction to: A decentralized honeypot for IoT Protocols based on Android devices
I Lygerou, S Srinivasa, E Vasilomanolakis, G Stergiopoulos, D Gritzalis
International Journal of Information Security 22 (1), 303-303, 2023
2023
An Empirical Analysis of Cyber Deception Systems
S Srinivasa
Aalborg Universitetsforlag, 2023
2023
A Bad IDEa: Weaponizing uncontrolled online-IDEs in availability attacks
S Srinivasa, D Georgoulias, JM Pedersen, E Vasilomanolakis
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 82-92, 2022
2022
Gotta catch'em all: a Multistage Framework for honeypot fingerprinting.(2021)
S Srinivasa, JM Pedersen, E Vasilomanolakis
arXiv preprint cs.CR/2109.10652, 2021
2021
HosTaGe: mobile honeypots for rapid deployment
E Vasilomanolakis, S Srinivasa, E Lygerou
Black Hat Europe 2020, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–18