Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks., , , , , , , , , and 1 other author(s). CoRR, (2020)DNSWeight: Quantifying Country-Wise Importance of Domain Name System., , , , and . IEEE Access, (2021)Model and analysis of single event transient sensitivity based on uncertainty quantification., and . Microprocess. Microsystems, (April 2022)Effect of temperature and single event transient on crosstalk in coupled single-walled carbon nanotube (SWCNT) bundle interconnects., , , and . Int. J. Circuit Theory Appl., 49 (10): 3408-3420 (2021)TL;DR Hazard: A Comprehensive Study of Levelsquatting Scams., , , , , , , , , and 3 other author(s). SecureComm (2), volume 305 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 3-25. Springer, (2019)Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs., , , , , , , , and . NDSS, The Internet Society, (2019)CDN Judo: Breaking the CDN DoS Protection with Itself., , , , , , , , and . NDSS, The Internet Society, (2020)Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation., , , , , , , and . NDSS, The Internet Society, (2023)TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis., , , , , , , , , and 3 other author(s). EuroS&P, page 560-575. IEEE, (2019)Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks., , , , , , , , , and . CCS, page 1939-1952. ACM, (2020)