Shreyas Srinivasa

Orcid: 0000-0002-5720-5504

According to our database1, Shreyas Srinivasa authored at least 13 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Correction to: A decentralized honeypot for IoT Protocols based on Android devices.
Int. J. Inf. Sec., 2023

An Analysis of War Impact on Ukrainian Critical Infrastructure Through Network Measurements.
Proceedings of the 7th Network Traffic Measurement and Analysis Conference, 2023

SweetCam: an IP Camera Honeypot.
Proceedings of the 5th Workshop on CPS&IoT Security and Privacy, 2023

2022
A decentralized honeypot for IoT Protocols based on Android devices.
Int. J. Inf. Sec., 2022

Honeysweeper: Towards Stealthy Honeytoken Fingerprinting Techniques.
Proceedings of the Secure IT Systems, 2022

Deceptive directories and "vulnerable" logs: a honeypot study of the LDAP and log4j attack landscape.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

A Bad IDEa: Weaponizing uncontrolled online-IDEs in availability attacks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

Interaction matters: a comprehensive analysis and a dataset of hybrid IoT/OT honeypots.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Gotta catch 'em all: a Multistage Framework for honeypot fingerprinting.
CoRR, 2021

Open for hire: attack trends and misconfiguration pitfalls of IoT devices.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

2020
Towards systematic honeytoken fingerprinting.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020

2016
Multi-stage attack detection and signature generation with ICS honeypots.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

2015
Did you really hack a nuclear power plant? An industrial control mobile honeypot.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015


  Loading...