Author of the publication

Towards designing effective visualizations for DNS-based network threat analysis.

, , and . VizSEC, page 1-8. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains., , , , , and . IEEE Symposium on Security and Privacy, page 691-706. IEEE Computer Society, (2016)Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries., , , , and . ACM Conference on Computer and Communications Security, page 211-222. ACM, (2008)By Hook or by Crook: Exposing the Diverse Abuse Tactics of Technical Support Scammers., , , , , , and . CoRR, (2017)Measuring and Detecting Malware Downloads in Live Network Traffic., , , , and . ESORICS, volume 8134 of Lecture Notes in Computer Science, page 556-573. Springer, (2013)Returning to Port: Efficient Detection of Home Router Devices., , and . CNS, page 172-180. IEEE, (2022)Measuring lower bounds of the financial abuse to online advertisers: A four year case study of the TDSS/TDL4 Botnet., , , , , and . Comput. Secur., (2017)Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and Operators., , , , , , , and . USENIX Security Symposium, page 5307-5324. USENIX Association, (2023)Stale TLS Certificates: Investigating Precarious Third-Party Access to Valid TLS Keys., , , , , , , and . IMC, page 222-235. ACM, (2023)Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild., , , , , , , , and . WWW, page 840-852. ACM, (2019)Efficient and Accurate Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks., , and . ACM Trans. Priv. Secur., 19 (2): 4:1-4:31 (2016)