Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Special issue on measure, detect and mitigate-challenges and trends in network security., , , , and . Int. J. Netw. Manag., 25 (5): 261-262 (2015)A Case of Identity: Detection of Suspicious IDN Homograph Domains Using Active DNS Measurements., , and . EuroS&P Workshops, page 559-564. IEEE, (2020)Millions of targets under attack: a macroscopic characterization of the DoS ecosystem., , , , , and . Internet Measurement Conference, page 100-113. ACM, (2017)Swamp of Reflectors: Investigating the Ecosystem of Open DNS Resolvers., , and . PAM (2), volume 14538 of Lecture Notes in Computer Science, page 3-18. Springer, (2024)IoT-Botnet Detection and Isolation by Access Routers., , , , , , and . NOF, page 88-95. IEEE, (2018)DDoS Mitigation: A Measurement-Based Approach., , and . NOMS, page 1-6. IEEE, (2020)Threat Identification Using Active DNS Measurements., and . AIMS, page 1-5. IFIP, (2018)Investigating the impact of DDoS attacks on DNS infrastructure., , , , , , and . IMC, page 51-64. ACM, (2022)Characterization of Anycast Adoption in the DNS Authoritative Infrastructure., , , , , , , , , and . TMA, IFIP, (2021)The Forgotten Side of DNS: Orphan and Abandoned Records., , , , , and . EuroS&P Workshops, page 538-543. IEEE, (2020)