Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Poster: Through the ccTLD Looking Glass: Mining CT Logs for Fun, Profit and Domain Names., and . IMC, page 714-715. ACM, (2023)Observable KINDNS: validating DNS hygiene., , and . IMC, page 740-741. ACM, (2022)Millions of targets under attack: a macroscopic characterization of the DoS ecosystem., , , , , and . Internet Measurement Conference, page 100-113. ACM, (2017)Hosting Industry Centralization and Consolidation., , and . CoRR, (2021)No Time for Downtime: Understanding Post-Attack Behaviors by Customers of Managed DNS Providers., , , , , and . EuroS&P Workshops, page 322-331. IEEE, (2022)Domain Name Lifetimes: Baseline and Threats., , , , , , , and . TMA, IFIP, (2022)Retroactive identification of targeted DNS infrastructure hijacking., , , , , , and . IMC, page 14-32. ACM, (2022)Lowering the Barriers to Working with Public RIR-Level Data., , and . ANRW, page 24-26. ACM, (2023)The far side of DNS amplification: tracing the DDoS attack ecosystem from the internet core., , , and . Internet Measurement Conference, page 419-434. ACM, (2021)Saving Brian's privacy: the perils of privacy exposure through reverse DNS., , , , and . IMC, page 1-13. ACM, (2022)