2022
ToN_IoT: The Role of Heterogeneity and the Need for Standardization of Features and Attack Types in IoT Network Intrusion Data Sets.
IEEE Internet Things J., 2022

Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profiles.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Catching Phishers By Their Bait: Investigating the Dutch Phishing Landscape through Phishing Kit Detection.
Proceedings of the 30th USENIX Security Symposium, 2021

Get Rich or Keep Tryin' Trajectories in dark net market vendor careers.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021

2020
Quality Evaluation of Cyber Threat Intelligence Feeds.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale.
Proceedings of the 28th USENIX Security Symposium, 2019

Just the Tip of the Iceberg: Internet-Scale Exploitation of Routers for Cryptojacking.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019