Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hosting Industry Centralization and Consolidation., , and . CoRR, (2021)Domain Name Lifetimes: Baseline and Threats., , , , , , , and . TMA, IFIP, (2022)No Time for Downtime: Understanding Post-Attack Behaviors by Customers of Managed DNS Providers., , , , , and . EuroS&P Workshops, page 322-331. IEEE, (2022)Poster: Through the ccTLD Looking Glass: Mining CT Logs for Fun, Profit and Domain Names., and . IMC, page 714-715. ACM, (2023)Observable KINDNS: validating DNS hygiene., , and . IMC, page 740-741. ACM, (2022)Millions of targets under attack: a macroscopic characterization of the DoS ecosystem., , , , , and . Internet Measurement Conference, page 100-113. ACM, (2017)Retroactive identification of targeted DNS infrastructure hijacking., , , , , , and . IMC, page 14-32. ACM, (2022)Hazardous Echoes: The DNS Resolvers that Should Be Put on Mute., , , , , and . TMA, page 1-10. IEEE, (2023)Lowering the Barriers to Working with Public RIR-Level Data., , and . ANRW, page 24-26. ACM, (2023)The far side of DNS amplification: tracing the DDoS attack ecosystem from the internet core., , , and . Internet Measurement Conference, page 419-434. ACM, (2021)