Leon Böck
Leon Böck
Phd Student, TU Darmstadt
Verified email at
Cited by
Cited by
A privacy-enhancing protocol that provides in-network data aggregation and verifiable smart meter billing
F Borges, D Demirel, L Böck, J Buchmann, M Mühlhäuser
2014 IEEE Symposium on Computers and Communications (ISCC), 1-6, 2014
Assessing the Threat of Blockchain-based Botnets
L Böck, N Alexopoulos, E Saracoglu, M Mühlhäuser, E Vasilomanolakis
Symposium on Electronic Crime Research (ecrime), 2019
Assessing Users’ Privacy and Security Concerns of Smart Home Technologies
V Zimmermann, P Gerber, K Marky, L Böck, F Kirchbuchner
i-com 18 (3), 197-216, 2019
Next generation p2p botnets: Monitoring under adverse conditions
L Böck, E Vasilomanolakis, M Mühlhäuser, S Karuppayah
Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018
Sensorbuster: On identifying sensor nodes in p2p botnets
S Karuppayah, L Böck, T Grube, S Manickam, M Mühlhäuser, M Fischer
Proceedings of the 12th International Conference on Availability …, 2017
Twitterize: Anonymous micro-blogging
J Daubert, L Böck, P Kikirasy, M Mühlhäuser, M Fischer
2014 IEEE/ACS 11th International Conference on Computer Systems and …, 2014
Autonomously detecting sensors in fully distributed botnets
L Böck, E Vasilomanolakis, JH Wolf, M Mühlhäuser
Computers & Security 83, 1-13, 2019
Hide and seek: detecting sensors in P2P botnets
L Böck, S Karuppayah, T Grube, M Mühlhäuser, M Fischer
2015 IEEE Conference on Communications and Network Security (CNS), 731-732, 2015
Smart Bears don't talk to strangers: analysing privacy concerns and technical solutions in smart toys for children
K Demetzou, L Böck, O Hanteer
IET Digital Library, 2018
I Trust my Zombies: A Trust-enabled Botnet
E Vasilomanolakis, JH Wolf, L Böck, S Karuppayah, M Mühlhäuser
arXiv preprint arXiv:1712.03713, 2017
Experiencing the detection of radicalized criminals on facebook social network and data-related issues.
A Tundis, L Böck, V Stanilescu, M Mühlhäuser
J. Cyber Secur. Mobil. 9 (2), 203-236, 2020
Processing of botnet tracking data under the GDPR
L Böck, M Fejrskov, K Demetzou, S Karuppayah, M Mühlhäuser, ...
Computer Law & Security Review 45, 105652, 2022
Limits in the data for detecting criminals on social media
A Tundis, L Böck, V Stanilescu, M Mühlhäuser
Proceedings of the 14th International Conference on Availability …, 2019
A formal Holon model for operating future energy grids during blackouts
S Valipour, F Volk, T Grube, L Böck, L Karg, M Mühlhäuser
2016 5th International Conference on Smart Cities and Green ICT Systems …, 2016
IoT dataset generation framework for evaluating anomaly detection mechanisms
A Meyer-Berg, R Egert, L Böck, M Mühlhäuser
Proceedings of the 15th International Conference on Availability …, 2020
Assessing Users’ Privacy and Security Concerns of Smart Home Technologies. i-com 18, 3 (2019), 197–216
V Zimmermann, P Gerber, K Marky, L Böck, F Kirchbuchner
How to Count Bots in Longitudinal Datasets of IP Addresses.
L Böck, D Levin, R Padmanabhan, C Doerr, M Mühlhäuser
NDSS, 2023
Poster: Challenges of Accurately Measuring Churn in P2P Botnets
L Böck, S Karuppayah, K Fong, M Mühlhäuser, E Vasilomanolakis
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
An Overview of the Botnet Simulation Framework
L Böck, S Karuppayah, M Mühlhäuser, E Vasilomanolakis
The Journal on Cybercrime & Digital Investigations 6 (1), 1-10, 2020
An uneven game of hide and seek: Hiding botnet CnC by encrypting IPs in DNS records
M Fejrskov, JM Pedersen, L Böck, E Vasilomanolakis
The system can't perform the operation now. Try again later.
Articles 1–20