The fake news machine: How propagandists abuse the internet and manipulate the public L Gu, V Kropotov, F Yarochkin Trend Micro 5 (1), 1-70, 2017 | 142 | 2017 |
The internet of things in the cybercrime underground S Hilt, V Kropotov, F Mercês, M Rosario, D Sancho Trend Micro Research, 2019 | 23 | 2019 |
The Fake News Machine L Gu, V Kropotov, F Yarochkin How Propagandists Abuse the Internet and Manipulate the Public. Pobrane 25, 2017 | 18 | 2017 |
Fake news and cyber propaganda: The use and abuse of social media L Gu, V Kropotov, F Yarochkin, J Leopando, J Estialbo Trend Micro 13, 2017 | 17* | 2017 |
Securing smart factories threats to manufacturing environments in the era of Industry 4.0 M Bakuei, R Flores, V Kropotov, F Yarochkin Trend Micro Res 41, 2019 | 11* | 2019 |
Investigating DNS traffic anomalies for malicious activities F Yarochkin, V Kropotov, Y Huang, GK Ni, SY Kuo, Y Chen 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks …, 2013 | 10 | 2013 |
Cybersecurity for Connected Cars Exploring Risks in 5G, Cloud, and Other Connected Technologies N Huq, C Gibson, V Kropotov, R Vosseler Trend Micro Research. https://documents. trendmicro. com/assets/white_papers …, 2021 | 7* | 2021 |
Modern ransomware’s double extortion tactics and how to protect enterprises against them M Fuentes, F Hacquebord, S Hilt, I Kenefick, V Kropotov, R McArdle, ... Trend Micro Research, 2021 | 6 | 2021 |
Trend Micro Security News.“ L Gu, V Kropotov, F Yarochkin Prototype Nation: The Chinese Cybercriminal Underground in, 2015 | 6 | 2015 |
Hacking mobile network via SS7: interception, shadowing and more D Kurbatov, V Kropotov Positive Technologies, 2021 | 3 | 2021 |
Digital Disinformation: Taxonomy, Impact, Mitigation, and Regulation (Dagstuhl Seminar 21402) C Kirchner, F Roesner Dagstuhl Reports 11 (9), 2022 | 2 | 2022 |
The Hacker Infrastructure and Underground Hosting: Services Used by Criminals V Kropotov, R McArdle, F Yarochkin | 2 | 2020 |
Exposed and vulnerable critical infrastructure: Water and Energy Industries S Hilt, N Huq, V Kropotov, R McArdle, C Pernet, R Reyes Trend Micro. https://documents. trendmicro. com/assets/white_papers/wp …, 2018 | 2 | 2018 |
Leaked Today, Exploited for Life: how Social Media Biometric Patterns Affect Your Future FY Craig Gibson, Vladimir Kropotov, Philippe Z Lin, Robert McArdle https://documents.trendmicro.com/assets/white_papers/wp-leaked-today …, 2022 | | 2022 |
How Underground Groups Use Stolen Identities and Deepfakes SH Vladimir Kropotov, Fyodor Yarochkin, Craig Gibson https://www.trendmicro.com/en_no/research/22/i/how-underground-groups-use …, 2022 | | 2022 |
SMS PVA An Underground Service Enabling Threat Actors to Register Bulk Fake Accounts FY Zhengyu Dong, Ryan Flores, Vladimir Kropotov, Paul Pajares https://documents.trendmicro.com/assets/white_papers/wp-sms-pva-underground …, 2022 | | 2022 |
Keeping Assets Safe From Cryptocurrency Scams and Schemes FY Cifer Fang, Vladimir Kropotov, Loseway Lu, Qi Sun https://www.trendmicro.com/content/dam/trendmicro/global/en/research/22/c/an …, 2022 | | 2022 |
Security for the Next-Generation Retail Supply Chain VK Mayra Fuentes, Craig Gibson, Numaan Huq https://www.trendmicro.com/vinfo/us/security/news/internet-of-things …, 2021 | | 2021 |
Cybercriminal ‘Cloud of Logs’ The Emerging Underground Business of Selling Access to Stolen Data FY Vladimir Kropotov https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital …, 2020 | | 2020 |
Cybercriminals Gamble With Victims' Livelihoods To Pass the Covid-19 Blues FY Erin Johnson, Vladimir Kropotov https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital …, 2020 | | 2020 |