Author of the publication

Deployment of Source Address Validation by Network Operators: A Randomized Control Trial.

, , , , , and . SP, page 2361-2378. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collectively exercising the right of access: individual effort, societal effect., , and . Internet Policy Rev., (2018)Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs., , , , , and . EuroS&P, page 579-594. IEEE, (2017)Easier Said Than Done: The Failure of Top-Level Cybersecurity Advice for Consumer IoT Devices., , , and . CoRR, (2023)Tough Decisions? Supporting System Classification According to the AI Act., , , , , , and . JURIX, volume 379 of Frontiers in Artificial Intelligence and Applications, page 353-358. IOS Press, (2023)Finding Harmony in the Noise: Blending Security Alerts for Attack Detection., , , , , , , , and . SAC, page 1385-1394. ACM, (2024)Disposable botnets: examining the anatomy of IoT botnet infrastructure., , , , , , , and . ARES, page 7:1-7:10. ACM, (2020)Where is the governance in Internet governance?, and . New Media Soc., 15 (5): 720-736 (2013)Security collapse in the HTTPS market., , , and . Commun. ACM, 57 (10): 47-55 (2014)Assuring high reliability of service provision in critical infrastructures., , , and . Int. J. Crit. Infrastructures, 2 (2/3): 231-246 (2006)SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations., , , , , , , , and . EuroS&P, page 440-456. IEEE, (2021)