Cyber threat intelligence: A product without a process? K Oosthoek, C Doerr International Journal of Intelligence and CounterIntelligence 34 (2), 300-315, 2021 | 94 | 2021 |
SoK: ATT&CK Techniques and Trends in Windows Malware K Oosthoek, C Doerr International Conference on Security and Privacy in Communication Systems, 2019 | 55 | 2019 |
From hodl to heist: Analysis of cyber security threats to bitcoin exchanges K Oosthoek, C Doerr 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 1-9, 2020 | 48 | 2020 |
A tale of two markets: Investigating the ransomware payments economy K Oosthoek, J Cable, G Smaragdakis Communications of the ACM 66 (8), 74-83, 2023 | 31 | 2023 |
Cyber security threats to Bitcoin exchanges: Adversary exploitation and laundering techniques K Oosthoek, C Doerr IEEE Transactions on Network and Service Management 18 (2), 1616-1628, 2020 | 31 | 2020 |
Scan, test, execute: Adversarial tactics in amplification DDoS attacks H Griffioen, K Oosthoek, P van der Knaap, C Doerr Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 30 | 2021 |
Flash crash for cash: Cyber threats in decentralized finance K Oosthoek arXiv preprint arXiv:2106.10740, 2021 | 21 | 2021 |
Quantifying dark web shops’ illicit revenue K Oosthoek, M Van Staalduinen, G Smaragdakis IEEE Access 11, 4794-4808, 2023 | 11 | 2023 |
Inside the matrix: CTI frameworks as partial abstractions of complex threats K Oosthoek, C Doerr 2021 IEEE International Conference on Big Data (Big Data), 2136-2143, 2021 | 5 | 2021 |
Cyber Security Threats to Bitcoin Exchanges K Oosthoek, C Dörr | | 2021 |