Hacking exposed industrial control systems: ICS and SCADA security secrets & solutions CE Bodungen (No Title), 2017 | 74 | 2017 |
The gaspot experiment: Unexamined perils in using K Wilhoit, S Hilt blackhat, 2015 | 42 | 2015 |
The internet of things in the cybercrime underground S Hilt, V Kropotov, F Mercês, M Rosario, D Sancho Trend Micro Research, 2019 | 23 | 2019 |
Caught in the act: Running a realistic factory honeypot to capture real threats S Hilt, F Maggi, C Perine, L Remorin, M Rösler, R Vosseler Trend Micro Research, 2020 | 21 | 2020 |
A security analysis of radio remote controllers for industrial applications J Andersson, M Balduzzi, S Hilt, P Lin, F Maggi, A Urano, R Vosseler Trend-Micro Research, Jan, 2019 | 9 | 2019 |
A security evaluation of industrial radio remote controllers F Maggi, M Balduzzi, J Andersson, P Lin, S Hilt, A Urano, R Vosseler Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019 | 7 | 2019 |
US cities exposed: Industries and ICS N Huq, S Hilt, N Hellberg A shodan-based security study of exposed systems and infrastructure in the US, 2017 | 7 | 2017 |
Modern ransomware’s double extortion tactics and how to protect enterprises against them M Fuentes, F Hacquebord, S Hilt, I Kenefick, V Kropotov, R McArdle, ... Trend Micro Research, 2021 | 6 | 2021 |
Worm war: The botnet battle for IoT territory S Hilt, F Mercês, M Rosario, D Sancho documents. trendmicro. com (), 30, 2020 | 6 | 2020 |
Securing Smart Cities—Moving toward Utopia with Security in Mind P Lin, M Swimmer, A Urano, S Hilt, R Vosseler Trend Micro Forward-Looking Threat Research (FTR) Team. A TrendLabs Research …, 2017 | 6 | 2017 |
The little pump gauge that could: Attacks against gas pump monitoring systems K Wilhoit, S Hilt Blackhat USA, 2015 | 5 | 2015 |
The near and far future of ransomware business models F Hacquebord, S Hilt, D Sancho Trend Micro Research, 2022 | 4 | 2022 |
Securing smart cities P Lin, M Swimmer, A Urano, S Hilt, R Vosseler Moving Toward Utopia with Security in Mind, TrendMicroTM, Incorporated …, 0 | 3 | |
North American Underground K Wilhoit, S Hilt | | |
How Cybercriminals Can Abuse Chat Platform APIs as C&C Infrastructures S Hilt, LA Remorin | | |
US Cities Exposed N Huq, S Hilt, N Hellberg | | |
Leaking Beeps S Hilt, P Lin | | |
Exposed and Vulnerable Critical Infrastructure S Hilt, N Huq, V Kropotov, R McArdle, C Pernet, R Reyes | | |
Cybersecurity Risks in Complex IoT Environments S Hilt, N Huq, M Rösler, A Urano | | |