Author of the publication

From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the Drop.

, , , , and . Internet Measurement Conference, page 322-328. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SoK: Cryptojacking Malware., , , , and . EuroS&P, page 120-139. IEEE, (2021)Overhaul: Input-Driven Access Control for Better Privacy on Traditional Operating Systems., , and . DSN, page 443-454. IEEE Computer Society, (2016)FIRE: FInding Rogue nEtworks., , , , and . ACSAC, page 231-240. IEEE Computer Society, (2009)Evaluation of a Publish/Subscribe System for Collaborative and Mobile Working., , , , and . WETICE, page 23-28. IEEE Computer Society, (2002)The Evolution of an Organizational Web Site: Migrating to XML/XSL., , , , and . WSE, page 62-69. IEEE Computer Society, (2001)Static analysis for detecting taint-style vulnerabilities in web applications., , and . J. Comput. Secur., 18 (5): 861-907 (2010)Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries., , , , , and . J. Comput. Secur., 17 (3): 305-329 (2009)EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis., , , and . NDSS, The Internet Society, (2011)A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication., , , and . NDSS, The Internet Society, (2013)GhostBuster: understanding and overcoming the pitfalls of transient execution vulnerability checkers., , , , , and . SANER, page 307-317. IEEE, (2021)