The fake news machine: How propagandists abuse the internet and manipulate the public L Gu, V Kropotov, F Yarochkin Trend Micro 5 (1), 1-70, 2017 | 149 | 2017 |
Xprobe2++: Low volume remote network information gathering tool FV Yarochkin, O Arkin, M Kydyraliev, SY Dai, Y Huang, SY Kuo 2009 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2009 | 49 | 2009 |
Xprobe v2. 0: A “Fuzzy” Approach to Remote Active Operating System Fingerprinting O Arkin, F Yarochkin 2011-06]. http://www. sys-security. com/archive/papers/Xprobe2. pdf, 2002 | 42 | 2002 |
The present and future of Xprobe2: The next generation of active operating system fingerprinting O Arkin, F Yarochkin, M Kydyraliev Sys-Security Group, July, 2003 | 33 | 2003 |
Towards adaptive covert communication system FV Yarochkin, SY Dai, CH Lin, Y Huang, SY Kuo 2008 14th IEEE Pacific Rim International Symposium on Dependable Computing …, 2008 | 30 | 2008 |
The Fake News Machine L Gu, V Kropotov, F Yarochkin How Propagandists Abuse the Internet and Manipulate the Public. Pobrane 25, 2017 | 18 | 2017 |
A fuzzy approach to remote active operating system fingerprinting O Arkin, F Yarochkin Available in http://www. syssecurity. com/archive/papers/Xprobe2. pdf, 2002 | 15 | 2002 |
Holography: a behavior‐based profiler for malware analysis SY Dai, Y Fyodor, MW Wu, Y Huang, SY Kuo Software: Practice and Experience 42 (9), 1107-1136, 2012 | 14 | 2012 |
Holography: a hardware virtualization tool for malware analysis SY Dai, Y Fyodor, JS Wu, CH Lin, Y Huang, SY Kuo 2009 15th IEEE Pacific rim international symposium on dependable computing …, 2009 | 14 | 2009 |
ICMP based remote OS TCP/IP stack fingerprinting techniques O Arkin, F Yarochkin Phrack Magazine 11 (57), 2001 | 13 | 2001 |
Fake news and cyber propaganda: The use and abuse of social media L Gu, V Kropotov, F Yarochkin, J Leopando, J Estialbo Trend Micro 13, 2017 | 11 | 2017 |
Investigating DNS traffic anomalies for malicious activities F Yarochkin, V Kropotov, Y Huang, GK Ni, SY Kuo, Y Chen 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks …, 2013 | 10 | 2013 |
X remote ICMP based OS fingerprinting techniques O Arkin, F Yarochkin Agosto de, 2001 | 10 | 2001 |
Securing smart factories threats to manufacturing environments in the era of Industry 4.0 M Bakuei, R Flores, V Kropotov, F Yarochkin Trend Micro Res 41, 2019 | 9 | 2019 |
Introducing P2P architecture in adaptive covert communication system FV Yarochkin, SY Dai, CH Lin, Y Huang, SY Kuo 2009 First Asian Himalayas International Conference on Internet, 1-7, 2009 | 9 | 2009 |
Xprobe F Yarochkin, M Kydyraliev, O Arkin Source code and documentation). URL: http://www. sys-security. com/html …, 2005 | 8 | 2005 |
Xprobe2-A „Fuzzy‟ Approach to Remote Active Operating System Fingerprinting A Ofir, F Yarochkin August, 2002 | 8 | 2002 |
Xprobe project F Yarochkin, M Kydyraliev, O Arkin | 7 | 2014 |
Trend Micro Security News.“ L Gu, V Kropotov, F Yarochkin Prototype Nation: The Chinese Cybercriminal Underground in, 2015 | 6 | 2015 |
The Fake News Machine: How Propagandists Abuse the Internet and Manipulate the Public. TrendMicro L Gu, V Kropotov, F Yarochkin | 5 | 2017 |