What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Carlos Hernandez Gañán
Google Scholar
11
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/istr
The machines are watching: Exploring the potential of Large Language Models for detecting Algorithmically Generated Domains.
Tomás Pelayo-Benedet
Ricardo J. Rodríguez
Carlos Hernandez Gañán
2024
conf/uss
IoT Market Dynamics: An Analysis of Device Sales, Security and Privacy Signals, and their Interactions.
Swaathi Vetrivel
Brennen Bouwmeester
Michel van Eeten
Carlos Hernandez Gañán
2024
conf/sp
Patchy Performance? Uncovering the Vulnerability Management Practices of IoT-Centric Vendors.
Sandra Rivera Pérez
Michel van Eeten
Carlos Hernandez Gañán
2023
conf/uss
Examining Consumer Reviews to Understand Security and Privacy Issues in the Market of Smart Home Devices.
Swaathi Vetrivel
Veerle van Harten
Carlos Hernandez Gañán
Michel van Eeten
Simon Parkin
2023
conf/eurosp
Towards more rigorous domain-based metrics: quantifying the prevalence and implications of "Active" Domains.
Siôn Lloyd
Carlos Hernandez Gañán
Samaneh Tajalizadehkhoob
2022
conf/uss
Helping hands: Measuring the impact of a large threat intelligence sharing community.
Xander Bouwman
Victor Le Pochat
Pawel Foremski
Tom van Goethem
Carlos Hernandez Gañán
Giovane C. M. Moura
Samaneh Tajalizadehkhoob
Wouter Joosen
Michel van Eeten
2022
conf/sp
Exposed Infrastructures: Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices.
Takayuki Sasaki
Akira Fujita
Carlos Hernandez Gañán
Michel van Eeten
Katsunari Yoshioka
Tsutomu Matsumoto
2022
conf/asiaccs
No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis.
Arwa Abdulkarim Al Alsadi
Kaichi Sameshima
Jakob Bleier
Katsunari Yoshioka
Martina Lindorfer
Michel van Eeten
Carlos Hernandez Gañán
2019
conf/uss
Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting.
Arman Noroozian
Jan Koenders
Eelco van Veldhuizen
Carlos Hernandez Gañán
Sumayah A. Alrwais
Damon McCoy
Michel van Eeten
2018
conf/uss
Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets.
Rolf van Wegberg
Samaneh Tajalizadehkhoob
Kyle Soska
Ugur Akyazi
Carlos Hernandez Gañán
Bram Klievink
Nicolas Christin
Michel van Eeten
2017
conf/nspw
Beyond the pretty penny: the Economic Impact of Cybercrime.
Carlos Hernandez Gañán
Michael Ciere
Michel van Eeten
Coauthors
Akira Fujita
(1)
Arman Noroozian
(1)
Arwa Abdulkarim Al Alsadi
(1)
Bram Klievink
(1)
Brennen Bouwmeester
(1)
Carlos Hernandez Gañán
(11)
Damon McCoy
(1)
Eelco van Veldhuizen
(1)
Giovane C. M. Moura
(1)
Jakob Bleier
(1)
Jan Koenders
(1)
Kaichi Sameshima
(1)
Katsunari Yoshioka
(2)
Kyle Soska
(1)
Martina Lindorfer
(1)
Michael Ciere
(1)
Michel van Eeten
(9)
Nicolas Christin
(1)
Pawel Foremski
(1)
Ricardo J. Rodríguez
(1)
Rolf van Wegberg
(1)
Samaneh Tajalizadehkhoob
(3)
Sandra Rivera Pérez
(1)
Simon Parkin
(1)
Siôn Lloyd
(1)
Sumayah A. Alrwais
(1)
Swaathi Vetrivel
(2)
Takayuki Sasaki
(1)
Tom van Goethem
(1)
Tomás Pelayo-Benedet
(1)
Tsutomu Matsumoto
(1)
Ugur Akyazi
(1)
Veerle van Harten
(1)
Victor Le Pochat
(1)
Wouter Joosen
(1)
Xander Bouwman
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to