Author of the publication

On the Origin of Scanning: The Impact of Location on Internet-Wide Scans.

, , , , , , and . Internet Measurement Conference, page 662-679. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Collusion Security of Random Codes., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 88-A (1): 296-304 (2005)AmpPot: Monitoring and Defending Against Amplification DDoS Attacks., , , , , , and . RAID, volume 9404 of Lecture Notes in Computer Science, page 615-636. Springer, (2015)Evaluating Malware Mitigation by Android Market Operators., , , , , and . CSET @ USENIX Security Symposium, USENIX Association, (2016)A Cross-Platform Study on IoT Malware., , , and . ICMU, page 1-2. IEEE, (2018)Disposable Botnets: Long-term Analysis of IoT Botnet Infrastructure., , , , , , , and . J. Inf. Process., (2022)ThingGate: A Gateway for Managing Traffic of Bare-metal IoT Honeypot., , and . J. Inf. Process., (2020)Honeypot Method to Lure Attackers Without Holding Crypto-Assets., , and . IEEE Access, (2024)Fighting IoT Cyberattacks: Device Discovery, Attack Observation and Security Notification.. CPSS@AsiaCCS, page 39-40. ACM, (2022)On the Origin of Scanning: The Impact of Location on Internet-Wide Scans., , , , , , and . Internet Measurement Conference, page 662-679. ACM, (2020)Peering into the Darkness: The Use of UTRS in Combating DDoS Attacks., , , , , , , and . ESORICS (2), volume 14345 of Lecture Notes in Computer Science, page 23-41. Springer, (2023)