Follow
Stephen Hilt
Stephen Hilt
Trend Micro
Verified email at trendmicro.com - Homepage
Title
Cited by
Cited by
Year
Hacking exposed industrial control systems: ICS and SCADA security secrets & solutions
CE Bodungen
(No Title), 2017
742017
The gaspot experiment: Unexamined perils in using
K Wilhoit, S Hilt
blackhat, 2015
422015
The internet of things in the cybercrime underground
S Hilt, V Kropotov, F Mercês, M Rosario, D Sancho
Trend Micro Research, 2019
232019
Caught in the act: Running a realistic factory honeypot to capture real threats
S Hilt, F Maggi, C Perine, L Remorin, M Rösler, R Vosseler
Trend Micro Research, 2020
212020
A security analysis of radio remote controllers for industrial applications
J Andersson, M Balduzzi, S Hilt, P Lin, F Maggi, A Urano, R Vosseler
Trend-Micro Research, Jan, 2019
92019
A security evaluation of industrial radio remote controllers
F Maggi, M Balduzzi, J Andersson, P Lin, S Hilt, A Urano, R Vosseler
Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019
72019
US cities exposed: Industries and ICS
N Huq, S Hilt, N Hellberg
A shodan-based security study of exposed systems and infrastructure in the US, 2017
72017
Modern ransomware’s double extortion tactics and how to protect enterprises against them
M Fuentes, F Hacquebord, S Hilt, I Kenefick, V Kropotov, R McArdle, ...
Trend Micro Research, 2021
62021
Worm war: The botnet battle for IoT territory
S Hilt, F Mercês, M Rosario, D Sancho
documents. trendmicro. com (), 30, 2020
62020
Securing Smart Cities—Moving toward Utopia with Security in Mind
P Lin, M Swimmer, A Urano, S Hilt, R Vosseler
Trend Micro Forward-Looking Threat Research (FTR) Team. A TrendLabs Research …, 2017
62017
The little pump gauge that could: Attacks against gas pump monitoring systems
K Wilhoit, S Hilt
Blackhat USA, 2015
52015
The near and far future of ransomware business models
F Hacquebord, S Hilt, D Sancho
Trend Micro Research, 2022
42022
Securing smart cities
P Lin, M Swimmer, A Urano, S Hilt, R Vosseler
Moving Toward Utopia with Security in Mind, TrendMicroTM, Incorporated …, 0
3
North American Underground
K Wilhoit, S Hilt
How Cybercriminals Can Abuse Chat Platform APIs as C&C Infrastructures
S Hilt, LA Remorin
US Cities Exposed
N Huq, S Hilt, N Hellberg
Leaking Beeps
S Hilt, P Lin
Exposed and Vulnerable Critical Infrastructure
S Hilt, N Huq, V Kropotov, R McArdle, C Pernet, R Reyes
Cybersecurity Risks in Complex IoT Environments
S Hilt, N Huq, M Rösler, A Urano
The system can't perform the operation now. Try again later.
Articles 1–19