Melting the Snow: Using Active DNS Measurements to Detect Snowshoe Spam Domains O van der Toorn, R van Rijswijk-Deij, B Geesink, A Sperotto NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 2018 | 21 | 2018 |
Addressing the challenges of modern DNS a comprehensive tutorial O van der Toorn, M Müller, S Dickinson, C Hesselman, A Sperotto, ... Computer Science Review 45, 100469, 2022 | 16 | 2022 |
A first look at HTTP (S) intrusion detection using NetFlow/IPFIX O van der Toorn, R Hofstede, M Jonker, A Sperotto 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015 | 16 | 2015 |
TXTing 101: Finding Security Issues in the Long Tail of DNS TXT Records O van der Toorn, R van Rijswijk-Deij, T Fiebig, M Lindorfer, A Sperotto 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020 | 15 | 2020 |
ANYway: Measuring the Amplification DDoS Potential of Domains O van der Toorn, J Krupp, M Jonker, R van Rijswijk-Deij, C Rossow, ... 2021 17th International Conference on Network and Service Management (CNSM …, 2021 | 13 | 2021 |
A Case of Identity: Detection of Suspicious IDN Homograph Domains Using Active DNS Measurements R Yazdani, O van der Toorn, A Sperotto 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020 | 12 | 2020 |
TIDE: Threat Identification Using Active DNS Measurements A Sperotto, O van der Toorn, R van Rijswijk-Deij Proceedings of the SIGCOMM Posters and Demos, 65-67, 2017 | 11 | 2017 |
Saving Brian's privacy: the perils of privacy exposure through reverse DNS O van der Toorn, R van Rijswijk-Deij, R Sommese, A Sperotto, M Jonker Proceedings of the 22nd ACM Internet Measurement Conference, 1-13, 2022 | 6 | 2022 |
Looking Beyond the Horizon: Thoughts on Proactive Detection of Threats OV Toorn, A Sperotto Digital Threats: Research and Practice 1 (1), 1-13, 2020 | 5 | 2020 |
Threat Identification Using Active DNS Measurements. O van der Toorn, A Sperotto AIMS, 1-5, 2018 | 1 | 2018 |
Proactive threat detection: A DNS based approach OI van der Toorn | | 2022 |
Computer Science Review O van der Toorn, M Müller, S Dickinson, C Hesselman, A Sperotto, ... | | 2022 |
Proactive Threat Detection O van der Toorn | | |