Author of the publication

Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai.

, , , , , , , , and . NDSS, The Internet Society, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs., , , , , and . EuroS&P, page 579-594. IEEE, (2017)Collectively exercising the right of access: individual effort, societal effect., , and . Internet Policy Rev., (2018)Tough Decisions? Supporting System Classification According to the AI Act., , , , , , and . JURIX, volume 379 of Frontiers in Artificial Intelligence and Applications, page 353-358. IOS Press, (2023)Easier Said Than Done: The Failure of Top-Level Cybersecurity Advice for Consumer IoT Devices., , , and . CoRR, (2023)Disposable botnets: examining the anatomy of IoT botnet infrastructure., , , , , , , and . ARES, page 7:1-7:10. ACM, (2020)Finding Harmony in the Noise: Blending Security Alerts for Attack Detection., , , , , , , , and . SAC, page 1385-1394. ACM, (2024)Alert Alchemy: SOC Workflows and Decisions in the Management of NIDS Rules., , , , and . CCS, page 2770-2784. ACM, (2023)The Role of Internet Service Providers in Botnet Mitigation: An Empirical Analysis Based on Spam Data., , , , and . WEIS, (2010)Two Sides of the Shield: Understanding Protective DNS adoption factors., , , , and . USENIX Security Symposium, page 3135-3152. USENIX Association, (2023)Internet Measurements and Public Policy: Mind the Gap., , and . CSET, USENIX Association, (2013)