ISC/DShield Related Research Papers
We are always eager to collaborate with researchers, and all of our data will be made accessible to researchers. For more details, see this page about our research feed. Much of our data can also simply be accessed via our API without requiring any support from us. (time is limited... and support may be slow depending on what else is going on :( ...)
Missing a paper? Let us know here. Papers are semi-random sorted.
Yegneswaran, V., Barford, P., & Ullrich, J. (2003). Internet intrusions: Global characteristics and prevalence. ACM SIGMETRICS Performance Evaluation Review, 31(1), 138-147.
Zhang, J., Porras, P. A., & Ullrich, J. (2008, July). Highly Predictive Blacklisting. In USENIX Security Symposium (pp. 107-122).
Zhang, J., Porras, P., & Ullrich, J. (2010). Gaussian process learning for cyber‐attack early warning. Statistical Analysis and Data Mining: The ASA Data Science Journal, 3(1), 56-68.
Kim, S. H., Wang, Q. H., & Ullrich, J. B. (2012). A comparative study of cyberattacks. Communications of the ACM, 55(3), 66-73.
Png, Ivan PL, Chen-Yu Wang, and Qiu-Hong Wang. "The deterrent and displacement effects of information security enforcement: International evidence." Journal of Management Information Systems 25, no. 2 (2008): 125-144.
Soldo, F., Le, A., & Markopoulou, A. (2010, March). Predictive blacklisting as an implicit recommendation system. In 2010 Proceedings IEEE INFOCOM (pp. 1-9). IEEE.
Koike, H., Ohno, K., & Koizumi, K. (2005, October). Visualizing cyber attacks using IP matrix. In IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05). (pp. 91-98). IEEE.
Chen, Z., Ji, C., & Barford, P. (2008, April). Spatial-temporal characteristics of internet malicious sources. In IEEE INFOCOM 2008-The 27th Conference on Computer Communications (pp. 2306-2314). IEEE.
Abu Rajab, M., Monrose, F., & Terzis, A. (2006, November). On the impact of dynamic addressing on malware propagation. In Proceedings of the 4th ACM workshop on Recurring malcode (pp. 51-56).
Sochor, T., & Zuzcak, M. (2014, June). Study of internet threats and attack methods using honeypots and honeynets. In International Conference on Computer Networks (pp. 118-127). Springer, Cham.
Van Horenbeeck, M. (2008, April). The SANS internet storm center. In 2008 WOMBAT Workshop on Information Security Threats Data Collection and Sharing (pp. 17-23). IEEE.
Bethencourt, John, Jason Franklin, and Mary K. Vernon. "Mapping Internet Sensors with Probe Response Attacks." In USENIX security symposium, pp. 193-208. 2005.
Easttom, Chuck. "Vulnerability Assessment and Management." In The NICE Cyber Security Framework, pp. 241-258. Springer, Cham, 2020.
Srivastava, Shashi Kant, Saini Das, Godwin J. Udo, and Kallol Bagchi. "Determinants of Cybercrime Originating within a Nation: A Cross-country Study." Journal of Global Information Technology Management (2020): 1-26.
Burton, Renée, and Laura Rocha. "Whitelists that Work: Creating Defensible Dynamic Whitelists with Statistical Learning." In 2019 APWG Symposium on Electronic Crime Research (eCrime), pp. 1-10. IEEE, 2019.
Kohlrausch, J., & Brin, E. A. (2020). ARIMA Supplemented Security Metrics for Quality Assurance and Situational Awareness. Digital Threats: Research and Practice, 1(1), 1-21.
Cohen, Dvir, Yisroel Mirsky, Yuval Elovici, Rami Puzis, Manuel Kamp, Tobias Martin, and Asaf Shabtai. "DANTE: A framework for mining and monitoring darknet traffic." arXiv preprint arXiv:2003.02575 (2020).
Vetterl, Alexander. "Honeypots in the age of universal attacks and the Internet of Things." PhD diss., University of Cambridge, 2020.
Velden, J. "Blacklist, do you copy? Characterizing information flow in public domain blacklists." Bachelor's thesis, University of Twente, 2020.
Novacic, Jelena, and Kablai Tokhi. "Implementation of Anomaly Detection on a Time-series Temperature Data set." (2019).