Follow
Vladimir Kropotov
Vladimir Kropotov
Senior Researcher Trend Micro
Verified email at trendmicro.com
Title
Cited by
Cited by
Year
The fake news machine: How propagandists abuse the internet and manipulate the public
L Gu, V Kropotov, F Yarochkin
Trend Micro 5 (1), 1-70, 2017
1412017
The internet of things in the cybercrime underground
S Hilt, V Kropotov, F Mercês, M Rosario, D Sancho
Trend Micro Research, 2019
232019
Fake news and cyber propaganda: The use and abuse of social media
L Gu, V Kropotov, F Yarochkin, J Leopando, J Estialbo
Trend Micro 13, 2017
17*2017
The Fake News Machine
L Gu, V Kropotov, F Yarochkin
How Propagandists Abuse the Internet and Manipulate the Public. Pobrane 25, 2017
172017
Securing smart factories threats to manufacturing environments in the era of Industry 4.0
M Bakuei, R Flores, V Kropotov, F Yarochkin
Trend Micro Res 41, 2019
11*2019
Investigating DNS traffic anomalies for malicious activities
F Yarochkin, V Kropotov, Y Huang, GK Ni, SY Kuo, Y Chen
2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks …, 2013
102013
Cybersecurity for Connected Cars Exploring Risks in 5G, Cloud, and Other Connected Technologies
N Huq, C Gibson, V Kropotov, R Vosseler
Trend Micro Research. https://documents. trendmicro. com/assets/white_papers …, 2021
62021
Modern ransomware’s double extortion tactics and how to protect enterprises against them
M Fuentes, F Hacquebord, S Hilt, I Kenefick, V Kropotov, R McArdle, ...
Trend Micro Research, 2021
62021
Trend Micro Security News.“
L Gu, V Kropotov, F Yarochkin
Prototype Nation: The Chinese Cybercriminal Underground in, 2015
62015
Hacking mobile network via SS7: interception, shadowing and more
D Kurbatov, V Kropotov
Positive Technologies, 2021
32021
Digital Disinformation: Taxonomy, Impact, Mitigation, and Regulation (Dagstuhl Seminar 21402)
C Kirchner, F Roesner
Dagstuhl Reports 11 (9), 2022
22022
The Hacker Infrastructure and Underground Hosting: Services Used by Criminals
V Kropotov, R McArdle, F Yarochkin
22020
Exposed and vulnerable critical infrastructure: Water and Energy Industries
S Hilt, N Huq, V Kropotov, R McArdle, C Pernet, R Reyes
Trend Micro. https://documents. trendmicro. com/assets/white_papers/wp …, 2018
22018
Leaked Today, Exploited for Life: how Social Media Biometric Patterns Affect Your Future
FY Craig Gibson, Vladimir Kropotov, Philippe Z Lin, Robert McArdle
https://documents.trendmicro.com/assets/white_papers/wp-leaked-today …, 2022
2022
How Underground Groups Use Stolen Identities and Deepfakes
SH Vladimir Kropotov, Fyodor Yarochkin, Craig Gibson
https://www.trendmicro.com/en_no/research/22/i/how-underground-groups-use …, 2022
2022
SMS PVA An Underground Service Enabling Threat Actors to Register Bulk Fake Accounts
FY Zhengyu Dong, Ryan Flores, Vladimir Kropotov, Paul Pajares
https://documents.trendmicro.com/assets/white_papers/wp-sms-pva-underground …, 2022
2022
Keeping Assets Safe From Cryptocurrency Scams and Schemes
FY Cifer Fang, Vladimir Kropotov, Loseway Lu, Qi Sun
https://www.trendmicro.com/content/dam/trendmicro/global/en/research/22/c/an …, 2022
2022
Security for the Next-Generation Retail Supply Chain
VK Mayra Fuentes, Craig Gibson, Numaan Huq
https://www.trendmicro.com/vinfo/us/security/news/internet-of-things …, 2021
2021
Cybercriminal ‘Cloud of Logs’ The Emerging Underground Business of Selling Access to Stolen Data
FY Vladimir Kropotov
https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital …, 2020
2020
Cybercriminals Gamble With Victims' Livelihoods To Pass the Covid-19 Blues
FY Erin Johnson, Vladimir Kropotov
https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital …, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20