Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Below the Radar: Spotting DNS Tunnels in Newly Observed Hostnames in the Wild., , and . eCrime, page 1-15. IEEE, (2019)Extended Abstract: A First Large-Scale Analysis on Usage of MTA-STS., , and . DIMVA, volume 12756 of Lecture Notes in Computer Science, page 361-370. Springer, (2021)Likes are not Likes A Crowdworking Platform Analysis., , , , , and . ICWSM Workshops, (2021)Measuring the Impact of the GDPR on Data Sharing in Ad Networks., , , , and . AsiaCCS, page 222-235. ACM, (2020)Large-scale measurements for enhancing network security.. Ruhr University Bochum, Germany, (2021)Analyzing leakage of personal information by malware., , , and . J. Comput. Secur., 27 (4): 459-481 (2019)Study of DNS Rebinding Attacks on Smart Home Devices., , and . CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS, volume 11980 of Lecture Notes in Computer Science, page 391-401. Springer, (2019)Digging Deeper: An Analysis of Domain Impersonation in the Lower DNS Hierarchy., , and . DIMVA, volume 12756 of Lecture Notes in Computer Science, page 68-87. Springer, (2021)A Study of Newly Observed Hostnames and DNS Tunneling in the Wild., , , and . CoRR, (2019)Masters of Time: An Overview of the NTP Ecosystem., , , and . EuroS&P, page 122-136. IEEE, (2018)