Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measuring the Security Harm of TLS Crypto Shortcuts., , and . Internet Measurement Conference, page 33-47. ACM, (2016)Partial Mobilization: Tracking Multilingual Information Flows Amongst Russian Media Outlets and Telegram., and . CoRR, (2023)Fast Internet-Wide Scanning: A New Security Perspective.. University of Michigan, USA, (2017)No Calm in The Storm: Investigating QAnon Website Relationships., , and . CoRR, (2021)Predicting IPv4 services across all ports., , and . SIGCOMM, page 503-515. ACM, (2022)What's in a Name? Exploring CA Certificate Control., , , , and . USENIX Security Symposium, page 4383-4400. USENIX Association, (2021)No Calm in the Storm: Investigating QAnon Website Relationships., , and . ICWSM, page 299-310. AAAI Press, (2022)ASdb: a system for classifying owners of autonomous systems., , , , and . Internet Measurement Conference, page 703-719. ACM, (2021)Retroactive identification of targeted DNS infrastructure hijacking., , , , , , and . IMC, page 14-32. ACM, (2022)Machine-Made Media: Monitoring the Mobilization of Machine-Generated Articles on Misinformation and Mainstream News Websites., and . ICWSM, page 542-556. AAAI Press, (2024)