Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Triplet Mining-based Phishing Webpage Detection., , , , and . LCN, page 377-380. IEEE, (2020)Packed to the Brim: Investigating the Impact of Highly Responsive Prefixes on Internet-wide Measurement Campaigns., , , , , and . CoRR, (2023)Towards Security Transparency of Autonomous Systems on the Internet., , and . ESORICS Workshops (2), volume 14399 of Lecture Notes in Computer Science, page 510-513. Springer, (2023)Mission accomplished?: HTTPS security after diginotar., , , , , and . Internet Measurement Conference, page 325-340. ACM, (2017)Open collaborative hyperpapers: a call to action., , , , , and . Comput. Commun. Rev., 49 (1): 31-33 (2019)On the Origin of Scanning: The Impact of Location on Internet-Wide Scans., , , , , , and . Internet Measurement Conference, page 662-679. ACM, (2020)Assessing the security of Internet paths: A case study of Dutch critical infrastructures., , , and . ANRW, ACM, (2024)Hazardous Echoes: The DNS Resolvers that Should Be Put on Mute., , , , , and . TMA, page 1-10. IEEE, (2023)A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web., , , , , , , , and . TMA, IFIP, (2020)Quantifying Security Risks in Cloud Infrastructures: A Data-driven Approach., , and . NetSoft, page 346-349. IEEE, (2023)