Open positions

  • Contact me if you have (or you are being close to have) an MSc in cyber-security/computer science, an exceptional educational/research background and you are keen into doing a PhD with me! Please include a CV on your email.

PhD Students

  • Ongoing: Ricardo Maria Yaben Lopezosa (Technical University of Denmark, 2023-now), area: IoT security
  • Ongoing: Dimitrios Georgoulias (Aalborg University, 2020-now), area: botnets
  • Ongoing: Shreyas Srinivasa (Aalborg University, 2020-now), area: honeypots, offensive cyber-security

Google Summer of Code (GSoC) students (collaboration with the Honeynet Project)

  • Aristofanis Chionis (Technical University of Denmark, 2023): Honeyscanner
  • Elisa Tsai (University of Michigan, 2023): Riotpot honeypot development
  • Yevonnael Andrew (Swiss German University, 2023): Whisperpot


Postdoctoral researchers

  • Erick Armando Diaz Hernandez (2022), area: threat detection in blockchain networks

PhD Students

  • Completed 🎉: Martin Fejrskov Andersen (Aalborg University, Telenor Denmark, 2019-2022), area: ISP-level malware detection

Google Summer of Code (GSoC) in collaboration with the Honeynet Project

  • Ricardo Maria Yaben Lopezosa (Aalborg University, 2022): RIoTPot honeypot development
  • Abhimanyu Rawat (Universitat Pompeu Fabra, 2021): RIoTPot honeypot development
  • Filip Adamik (Aalborg University, 2021), area: HosTaGe mobile honeypot development
  • Eirini Lygerou (Athens University of Economics and Business, 2020), area: HosTaGe mobile honeypot development

MSc Students

  1. Invisible Deception: Redesigning Honeytokens to Combat Fingerprinting, Akos Pilis (Technical University of Denmark, 2023)
  2. Hackers Are Moving: A Quantitative Analysis of Darknet Markets Products Related to Cyber Security, Ricardo Maria Yaben Lopezosa (Aalborg University, 2022)
  3. Incident Information Sharing in the Danish Critical Infrastructure: Proposal of a Conceptual Centralised Framework, Ievgeniia Moturi, Michael Christensen, Livia Dzupinova (Aalborg University, 2022)
  4. Password Labeller, A game for investigative study into the implicit, sociological meaning of passwords, Daniel Christopher Mølmark-O’Connor (Aalborg University, 2022)
  5. IT Reconnaissance Automation, Mathias Gam-Pedersen (Aalborg University, 2022)
  6. Scalable Sandboxing System, Kim Christensen (Aalborg University, 2022)
  7. Cyber Risk Quantification Using Open-Source Intelligence Gathering, Jimmi Frankel Torp (Aalborg University, 2022)
  8. Early Vulnerability Detection Using Signals from Web, Filip Adamik (Aalborg University, 2020)
  9. Feasibility of Blockchain-based Botnets: Emine Saracoglu (TU Darmstadt, 2019)
  10. Investigating the capabilities of a binary classifier to detect known and unknown botnets: Giorgio Bertagnolli (TU Darmstadt, 2019)
  11. Reverse Engineering of Sophisticated peer-to-peer IoT-Botnet Malware: Joel Küpper (TU Darmstadt, 2018)
  12. A Fuzzy Password Strength Evaluator for analysing large leaked password databases: Hong Ngoc Hoang (TU Darmstadt, 2018)
  13. HoneyDrone – A Honeypot for Drone Systems: Dhanasekar Boopalan (TU Darmstadt, 2018)
  14. Trust in Collaborative Intrusion Detection: Franklin Labang G. (TU Darmstadt, 2018)
  15. On P2P Botnet Monitoring in Adverse Conditions: Leon Böck (TU Darmstadt, 2017)
  16. Using blockchains for alert data dissemination between CIDS monitors: Natalia Reka Ivanko (TU Darmstadt, 2017)
  17. Trust Management in P2P Botnets: Jan Helge Wolf (TU Darmstadt, 2017)
  18. On the Analysis & Generation of Synthetic Attacks for Intrusion Detection Systems: Aidmar Wainakh (TU Darmstadt, 2017) *** shortlisted for the Competence Center for Applied Security Technology (CAST) award for IT Security 2018 ***
  19. Comparison and Evaluation of Honeypots: Pereira Sherryl Ann (TU Darmstadt, 2016)
  20. Extended probe-response attacks on cyber-incident monitors: Sharief Noorulla (TU Darmstadt, 2016)
  21. A Mobile Honeypot for Industrial Control Systems: Shreyas Srinivasa (TU Darmstadt, 2015)
  22. ID2T: an Intrusion Detection Dataset Toolkit: Nikolay Milanov (TU Darmstadt, 2015)
  23. Probe response attacks on cyber incident monitors: Michael Stahn (TU Darmstadt, 2015)
  24. Membership Management for unstructured distributed Collaborative IDS: Matthias Krügl (TU Darmstadt, 2015)
  25. Peer to peer based Intrusion Detection: Ahsan Malik (TU Darmstadt, 2014)

BSc Students

  1. An open-source approach to leaked account data for DTU users: Niels Kjær Ersbøll, Frederik Peetz-Schou Larsen (DTU, 2023)
  2. Analyzing Bitcoin’s OP RETURN operator: Johannes Mols (Aalborg University, 2020)
  3. Infiltrating Dark Net Underground Hacking Marketplaces: Ricardo Maria Yaben Lopezosa (Aalborg University, 2020)
  4. Developing an Autonomous Drone using Machine Learning and Simulations: Lasse Skjøtt Hansen, Anton Krogh Petersen (Aalborg University, 2020)
  5. Blockchain-based market for alert data exchange in Collaborative Intrusion Detections Systems: Steven Rowe (TU Darmstadt, 2018)
  6. A Toolkit for Synthetic Injection of Attacks into Network Data: Patrick Jattke (TU Darmstadt, 2016)