Author of the publication

Measuring and Applying Invalid SSL Certificates: The Silent Majority.

, , , , , , and . Internet Measurement Conference, page 527-541. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machine learning, data mining and Big Data frameworks for network monitoring and troubleshooting., , , and . Comput. Networks, (2016)Not Your Average App: A Large-scale Privacy Analysis of Android Browsers., , , , , , and . Proc. Priv. Enhancing Technol., 2023 (1): 29-46 (January 2023)Measuring and Applying Invalid SSL Certificates: The Silent Majority., , , , , , and . Internet Measurement Conference, page 527-541. ACM, (2016)Should You Use the App for That?: Comparing the Privacy Implications of App- and Web-based Online Services., , , and . Internet Measurement Conference, page 365-372. ACM, (2016)A Broad View of the Ecosystem of Socially Engineered Exploit Documents., , , , and . NDSS, The Internet Society, (2017)PoiRoot: investigating the root cause of interdomain path changes., , , , , and . SIGCOMM, page 183-194. ACM, (2013)On blind mice and the elephant: understanding the network impact of a large distributed system., , , , and . SIGCOMM, page 110-121. ACM, (2011)Taming the torrent: a practical approach to reducing cross-isp traffic in peer-to-peer systems., and . SIGCOMM, page 363-374. ACM, (2008)Drafting behind Akamai (travelocity-based detouring)., , , and . SIGCOMM, page 435-446. ACM, (2006)Crowdsourcing service-level network event monitoring., , and . SIGCOMM, page 387-398. ACM, (2010)