Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SPF Beyond the Standard: Management and Operational Challenges in Practice and Practical Recommendations., , , and . USENIX Security Symposium, USENIX Association, (2024)Back-to-the-Future Whois: An IP Address Attribution Service for Working with Historic Datasets., , , , and . PAM, volume 13882 of Lecture Notes in Computer Science, page 209-226. Springer, (2023)How Ready is DNS for an IPv6-Only World?, , , , , , and . PAM, volume 13882 of Lecture Notes in Computer Science, page 525-549. Springer, (2023)Crisis, Ethics, Reliability & a measurement.network: Reflections on Active Network Measurements in Academia.. ANRW, page 44-50. ACM, (2023)Not that Simple: Email Delivery in the 21st Century., , , and . USENIX ATC, page 295-308. USENIX Association, (2022)Connecting the .dotfiles: Checked-In Secret Exposure with Extra (Lateral Movement) Steps., , , , , and . MSR, page 322-333. IEEE, (2023)TXTing 101: Finding Security Issues in the Long Tail of DNS TXT Records., , , , and . EuroS&P Workshops, page 544-549. IEEE, (2020)SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations., , , , , , , , and . EuroS&P, page 440-456. IEEE, (2021)Out of Sight, Out of Mind: Detecting Orphaned Web Pages at Internet-Scale., , and . CCS, page 21-35. ACM, (2021)Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context., , , , and . USENIX Security Symposium, page 3433-3450. USENIX Association, (2022)