Author of the publication

DNS Dependencies as an Expression of the Digital Divide: The Example of Australia.

, , , and . ESORICS Workshops (2), volume 14399 of Lecture Notes in Computer Science, page 496-509. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Summarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS)., , and . RFC, (February 2015)LoRadar: LoRa sensor network monitoring through passive packet sniffing., , , , , , , and . Comput. Commun. Rev., 50 (4): 10-24 (2020)Update on ACM SIGCOMM CCR reviewing process: towards a more open review process., , , , , , , , , and 3 other author(s). Comput. Commun. Rev., 50 (3): 55-56 (2020)Triplet Mining-based Phishing Webpage Detection., , , , and . LCN, page 377-380. IEEE, (2020)Packed to the Brim: Investigating the Impact of Highly Responsive Prefixes on Internet-wide Measurement Campaigns., , , , , and . CoRR, (2023)Towards Security Transparency of Autonomous Systems on the Internet., , and . ESORICS Workshops (2), volume 14399 of Lecture Notes in Computer Science, page 510-513. Springer, (2023)Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)., , and . RFC, (May 2015)A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web., , , , , , , , and . TMA, IFIP, (2020)Hazardous Echoes: The DNS Resolvers that Should Be Put on Mute., , , , , and . TMA, page 1-10. IEEE, (2023)Quantifying Security Risks in Cloud Infrastructures: A Data-driven Approach., , and . NetSoft, page 346-349. IEEE, (2023)