Author of the publication

Measuring Network Reputation in the Ad-Bidding Process.

, , , , and . DIMVA, volume 10327 of Lecture Notes in Computer Science, page 388-409. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What's in a Name? Exploring CA Certificate Control., , , , and . USENIX Security Symposium, page 4383-4400. USENIX Association, (2021)An Inside Look into the Practice of Malware Analysis., , , , , and . CCS, page 3053-3069. ACM, (2021)View from Above: Exploring the Malware Ecosystem from the Upper DNS Hierarchy., , , , , , , , and . ACSAC, page 240-250. ACM, (2022)Segugio: Efficient Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks., , and . DSN, page 403-414. IEEE Computer Society, (2015)WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks., , , and . DSN, page 3-12. IEEE Computer Society, (2009)Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains., , , , , and . IEEE Symposium on Security and Privacy, page 691-706. IEEE Computer Society, (2016)By Hook or by Crook: Exposing the Diverse Abuse Tactics of Technical Support Scammers., , , , , , and . CoRR, (2017)Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries., , , , and . ACM Conference on Computer and Communications Security, page 211-222. ACM, (2008)Measuring and Detecting Malware Downloads in Live Network Traffic., , , , and . ESORICS, volume 8134 of Lecture Notes in Computer Science, page 556-573. Springer, (2013)Stale TLS Certificates: Investigating Precarious Third-Party Access to Valid TLS Keys., , , , , , , and . IMC, page 222-235. ACM, (2023)