Follow
Kris Oosthoek
Title
Cited by
Cited by
Year
Cyber threat intelligence: A product without a process?
K Oosthoek, C Doerr
International Journal of Intelligence and CounterIntelligence 34 (2), 300-315, 2021
702021
SoK: ATT&CK Techniques and Trends in Windows Malware
K Oosthoek, C Doerr
International Conference on Security and Privacy in Communication Systems, 2019
462019
From hodl to heist: Analysis of cyber security threats to bitcoin exchanges
K Oosthoek, C Doerr
2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 1-9, 2020
342020
A tale of two markets: Investigating the ransomware payments economy
K Oosthoek, J Cable, G Smaragdakis
Communications of the ACM 66 (8), 74-83, 2023
232023
Cyber security threats to Bitcoin exchanges: Adversary exploitation and laundering techniques
K Oosthoek, C Doerr
IEEE Transactions on Network and Service Management 18 (2), 1616-1628, 2020
192020
Scan, test, execute: Adversarial tactics in amplification DDoS attacks
H Griffioen, K Oosthoek, P van der Knaap, C Doerr
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
182021
Flash crash for cash: Cyber threats in decentralized finance
K Oosthoek
arXiv preprint arXiv:2106.10740, 2021
182021
Quantifying dark web shops’ illicit revenue
K Oosthoek, M Van Staalduinen, G Smaragdakis
IEEE Access 11, 4794-4808, 2023
62023
Inside the matrix: CTI frameworks as partial abstractions of complex threats
K Oosthoek, C Doerr
2021 IEEE International Conference on Big Data (Big Data), 2136-2143, 2021
22021
The system can't perform the operation now. Try again later.
Articles 1–9