Personensuche
X
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
2
IoTFlow: Inferring IoT Device Behavior at Scale through Sta..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
3
Out of Sight, Out of Mind: Detecting Orphaned Web Pages at ..:
, In:
?
Passive and Active Measurement; Lecture Notes in Computer Science ,
4
Can Encrypted DNS Be Fast?:
, In:
?
Proceedings of the Applied Networking Research Workshop ,
5
Encryption without centralization : distributing DNS que..:
, In:
?
Proceedings of the Twentieth ACM Workshop on Hot Topics in Networks ,
6
Designing for Tussle in Encrypted DNS:
, In:
?
Proceedings of The Web Conference 2020 ,
7
Comparing the Effects of DNS, DoT, and DoH on Web Performan..:
, In:
?
Proceedings of The Web Conference 2020 ,
8
Understanding the Performance Costs and Benefits of Privacy..:
, In:
?
Proceedings of the Applied Networking Research Workshop ,
9
Analyzing the costs (and benefits) of DNS, DoT, and DoH for..:
, In:
?
Proceedings of the Applied Networking Research Workshop ,
10
Cloud Strife : Mitigating the Security Risks of Domain-V..:
, In:
?
2018 IEEE Symposium on Security and Privacy (SP) ,
11
Enumerating Active IPv6 Hosts for Large-Scale Security Scan..:
, In:
?
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security ,
12
Investigating System Operators' Perspective on Security Mis..:
, In:
?
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security ,
14
Drops for Stuff : An Analysis of Reshipping Mule Scams:
, In:
?
Proceedings of the 23rd International Conference on World Wide Web ,
15