Author of the publication

Anomaly-based Filtering of Application-Layer DDoS Against DNS Authoritatives.

, and . EuroS&P, page 558-575. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels., , , , and . CCS, page 1489-1503. ACM, (2022)AmpFuzz: Fuzzing for Amplification DDoS Vulnerabilities., , and . USENIX Security Symposium, page 1043-1060. USENIX Association, (2022)Exploiting visual appearance to cluster and detect rogue software., , and . SAC, page 1776-1783. ACM, (2013)On measuring the impact of DDoS botnets., , and . EUROSEC, page 3:1-3:6. ACM, (2014)ProVeX: Detecting Botnets with Encrypted Command and Control Channels., and . DIMVA, volume 7967 of Lecture Notes in Computer Science, page 21-40. Springer, (2013)BGPeek-a-Boo: Active BGP-based Traceback for Amplification DDoS Attacks., and . EuroS&P, page 423-439. IEEE, (2021)ResolFuzz: Differential Fuzzing of DNS Resolvers., and . ESORICS (2), volume 14345 of Lecture Notes in Computer Science, page 62-80. Springer, (2023)On Botnets That Use DNS for Command and Control., , , , , and . EC2ND, page 9-16. IEEE Computer Society, (2011)Large-Scale Analysis of Malware Downloaders., , and . DIMVA, volume 7591 of Lecture Notes in Computer Science, page 42-61. Springer, (2012)FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers., , , , , , , , and . CCS, page 975-989. ACM, (2023)