Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Anna Sperotto
@inproceedings{DBLP:conf/pam/YazdaniJS24, author = {Ramin Yazdani and Mattijs Jonker and Anna Sperotto}, editor = {Philipp Richter and Vaibhav Bajpai and Esteban Carisimo}, title = {Swamp of Reflectors: Investigating the Ecosystem of Open {DNS} Resolvers}, booktitle = {Passive and Active Measurement - 25th International Conference, {PAM} 2024, Virtual Event, March 11-13, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14538}, pages = {3--18}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-56252-5\_1}, doi = {10.1007/978-3-031-56252-5\_1}, timestamp = {Fri, 29 Mar 2024 23:01:36 +0100}, biburl = {https://dblp.org/rec/conf/pam/YazdaniJS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsoft/TarahomiHS23, author = {Sousan Tarahomi and Ralph Holz and Anna Sperotto}, editor = {Carlos J. Bernardos and Barbara Martini and Elisa Rojas and F{\'{a}}bio Luciano Verdii and Zuqing Zhu and Eiji Oki and Helge Parzyjegla}, title = {Quantifying Security Risks in Cloud Infrastructures: {A} Data-driven Approach}, booktitle = {9th {IEEE} International Conference on Network Softwarization, NetSoft 2023, Madrid, Spain, June 19-23, 2023}, pages = {346--349}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/NetSoft57336.2023.10175501}, doi = {10.1109/NETSOFT57336.2023.10175501}, timestamp = {Thu, 20 Jul 2023 12:34:37 +0200}, biburl = {https://dblp.org/rec/conf/netsoft/TarahomiHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pam/KhanSHR23, author = {Etienne Khan and Anna Sperotto and Jeroen van der Ham and Roland van Rijswijk{-}Deij}, editor = {Anna Brunstr{\"{o}}m and Marcel Flores and Marco Fiore}, title = {Stranger VPNs: Investigating the Geo-Unblocking Capabilities of Commercial {VPN} Providers}, booktitle = {Passive and Active Measurement - 24th International Conference, {PAM} 2023, Virtual Event, March 21-23, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13882}, pages = {46--68}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-28486-1\_3}, doi = {10.1007/978-3-031-28486-1\_3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pam/KhanSHR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tma/YazdaniNHKJS23, author = {Ramin Yazdani and Yevheniya Nosyk and Ralph Holz and Maciej Korczynski and Mattijs Jonker and Anna Sperotto}, title = {Hazardous Echoes: The {DNS} Resolvers that Should Be Put on Mute}, booktitle = {7th Network Traffic Measurement and Analysis Conference, {TMA} 2023, Naples, Italy, June 26-29, 2023}, pages = {1--10}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/TMA58422.2023.10198955}, doi = {10.23919/TMA58422.2023.10198955}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tma/YazdaniNHKJS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csr/ToornMDHSR22, author = {Olivier van der Toorn and Moritz M{\"{u}}ller and Sara Dickinson and Cristian Hesselman and Anna Sperotto and Roland van Rijswijk{-}Deij}, title = {Addressing the challenges of modern {DNS} a comprehensive tutorial}, journal = {Comput. Sci. Rev.}, volume = {45}, pages = {100469}, year = {2022}, url = {https://doi.org/10.1016/j.cosrev.2022.100469}, doi = {10.1016/J.COSREV.2022.100469}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csr/ToornMDHSR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/ToornRSSJ22, author = {Olivier van der Toorn and Roland van Rijswijk{-}Deij and Raffaele Sommese and Anna Sperotto and Mattijs Jonker}, editor = {Chadi Barakat and Cristel Pelsser and Theophilus A. Benson and David R. Choffnes}, title = {Saving Brian's privacy: the perils of privacy exposure through reverse {DNS}}, booktitle = {Proceedings of the 22nd {ACM} Internet Measurement Conference, {IMC} 2022, Nice, France, October 25-27, 2022}, pages = {1--13}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3517745.3561424}, doi = {10.1145/3517745.3561424}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/ToornRSSJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/SommesecRCDSJ22, author = {Raffaele Sommese and kc claffy and Roland van Rijswijk{-}Deij and Arnab Chattopadhyay and Alberto Dainotti and Anna Sperotto and Mattijs Jonker}, editor = {Chadi Barakat and Cristel Pelsser and Theophilus A. Benson and David R. Choffnes}, title = {Investigating the impact of DDoS attacks on {DNS} infrastructure}, booktitle = {Proceedings of the 22nd {ACM} Internet Measurement Conference, {IMC} 2022, Nice, France, October 25-27, 2022}, pages = {51--64}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3517745.3561458}, doi = {10.1145/3517745.3561458}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/SommesecRCDSJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/DietzADSP22, author = {Christian Dietz and Marcel Antzek and Gabi Dreo and Anna Sperotto and Aiko Pras}, title = {{DMEF:} Dynamic Malware Evaluation Framework}, booktitle = {2022 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2022, Budapest, Hungary, April 25-29, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/NOMS54207.2022.9789908}, doi = {10.1109/NOMS54207.2022.9789908}, timestamp = {Wed, 15 Jun 2022 16:45:18 +0200}, biburl = {https://dblp.org/rec/conf/noms/DietzADSP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pam/YazdaniRJS22, author = {Ramin Yazdani and Roland van Rijswijk{-}Deij and Mattijs Jonker and Anna Sperotto}, editor = {Oliver Hohlfeld and Giovane Cesar Moreira Moura and Cristel Pelsser}, title = {A Matter of Degree: Characterizing the Amplification Power of Open {DNS} Resolvers}, booktitle = {Passive and Active Measurement - 23rd International Conference, {PAM} 2022, Virtual Event, March 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13210}, pages = {293--318}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-98785-5\_13}, doi = {10.1007/978-3-030-98785-5\_13}, timestamp = {Wed, 16 Aug 2023 21:16:31 +0200}, biburl = {https://dblp.org/rec/conf/pam/YazdaniRJS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/YazdaniHHRDSJ22, author = {Ramin Yazdani and Alden Hilton and Jeroen van der Ham and Roland van Rijswijk{-}Deij and Casey T. Deccio and Anna Sperotto and Mattijs Jonker}, title = {Mirrors in the Sky: On the Potential of Clouds in {DNS} Reflection-based Denial-of-Service Attacks}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {263--275}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545959}, doi = {10.1145/3545948.3545959}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/YazdaniHHRDSJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tma/2022, editor = {Roya Ensafi and Andra Lutu and Anna Sperotto and Roland van Rijswijk{-}Deij}, title = {6th Network Traffic Measurement and Analysis Conference, {TMA} 2022, Enschede, The Netherlands, June 27-30, 2022}, publisher = {{IFIP}}, year = {2022}, url = {https://dl.ifip.org/db/conf/tma/tma2022/index.html}, isbn = {978-3-903176-47-8}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tma/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-01160, author = {Olivier van der Toorn and Raffaele Sommese and Anna Sperotto and Roland van Rijswijk{-}Deij and Mattijs Jonker}, title = {Saving Brian's Privacy: the Perils of Privacy Exposure through Reverse {DNS}}, journal = {CoRR}, volume = {abs/2202.01160}, year = {2022}, url = {https://arxiv.org/abs/2202.01160}, eprinttype = {arXiv}, eprint = {2202.01160}, timestamp = {Wed, 09 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-01160.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsm/ToornKJRRS21, author = {Olivier van der Toorn and Johannes Krupp and Mattijs Jonker and Roland van Rijswijk{-}Deij and Christian Rossow and Anna Sperotto}, editor = {Prosper Chemouil and Mehmet Ulema and Stuart Clayman and M{\"{u}}ge Sayit and Cihat {\c{C}}etinkaya and Stefano Secci}, title = {ANYway: Measuring the Amplification DDoS Potential of Domains}, booktitle = {17th International Conference on Network and Service Management, {CNSM} 2021, Izmir, Turkey, October 25-29, 2021}, pages = {500--508}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/CNSM52442.2021.9615596}, doi = {10.23919/CNSM52442.2021.9615596}, timestamp = {Sun, 02 Oct 2022 15:57:41 +0200}, biburl = {https://dblp.org/rec/conf/cnsm/ToornKJRRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tma/SommeseAJMDRVSC21, author = {Raffaele Sommese and Gautam Akiwate and Mattijs Jonker and Giovane C. M. Moura and Marco Davids and Roland van Rijswijk{-}Deij and Geoffrey M. Voelker and Stefan Savage and Kimberly C. Claffy and Anna Sperotto}, editor = {Vaibhav Bajpai and Hamed Haddadi and Oliver Hohlfeld}, title = {Characterization of Anycast Adoption in the {DNS} Authoritative Infrastructure}, booktitle = {5th Network Traffic Measurement and Analysis Conference, {TMA} 2021, Virtual Event, September 14-15, 2021}, publisher = {{IFIP}}, year = {2021}, url = {http://dl.ifip.org/db/conf/tma/tma2021/tma2021-paper1.pdf}, timestamp = {Fri, 01 Oct 2021 09:02:23 +0200}, biburl = {https://dblp.org/rec/conf/tma/SommeseAJMDRVSC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/MisaGHDSDR20, author = {Chris Misa and Dennis Guse and Oliver Hohlfeld and Ramakrishnan Durairajan and Anna Sperotto and Alberto Dainotti and Reza Rejaie}, title = {Lessons learned organizing the {PAM} 2020 virtual conference}, journal = {Comput. Commun. Rev.}, volume = {50}, number = {3}, pages = {46--54}, year = {2020}, url = {https://doi.org/10.1145/3411740.3411747}, doi = {10.1145/3411740.3411747}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccr/MisaGHDSDR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/HolzMBHCGACKRSV20, author = {Ralph Holz and Marco Mellia and Olivier Bonaventure and Hamed Haddadi and Matthew Caesar and Sergey Gorinsky and Gianni Antichi and Joseph Camp and kc claffy and Bhaskaran Raman and Anna Sperotto and Aline Carneiro Viana and Steve Uhlig}, title = {Update on {ACM} {SIGCOMM} {CCR} reviewing process: towards a more open review process}, journal = {Comput. Commun. Rev.}, volume = {50}, number = {3}, pages = {55--56}, year = {2020}, url = {https://doi.org/10.1145/3411740.3411748}, doi = {10.1145/3411740.3411748}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/HolzMBHCGACKRSV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnsm/HesselmanGHKXJR20, author = {Cristian Hesselman and Paola Grosso and Ralph Holz and Fernando Kuipers and Janet Hui Xue and Mattijs Jonker and Joeri de Ruiter and Anna Sperotto and Roland van Rijswijk{-}Deij and Giovane C. M. Moura and Aiko Pras and Cees de Laat}, title = {A Responsible Internet to Increase Trust in the Digital World}, journal = {J. Netw. Syst. Manag.}, volume = {28}, number = {4}, pages = {882--922}, year = {2020}, url = {https://doi.org/10.1007/s10922-020-09564-7}, doi = {10.1007/S10922-020-09564-7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnsm/HesselmanGHKXJR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/SommeseJRDCS20, author = {Raffaele Sommese and Mattijs Jonker and Roland van Rijswijk{-}Deij and Alberto Dainotti and Kimberly C. Claffy and Anna Sperotto}, title = {The Forgotten Side of {DNS:} Orphan and Abandoned Records}, booktitle = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2020, Genoa, Italy, September 7-11, 2020}, pages = {538--543}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuroSPW51379.2020.00079}, doi = {10.1109/EUROSPW51379.2020.00079}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/SommeseJRDCS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/ToornRFLS20, author = {Olivier van der Toorn and Roland van Rijswijk{-}Deij and Tobias Fiebig and Martina Lindorfer and Anna Sperotto}, title = {TXTing 101: Finding Security Issues in the Long Tail of {DNS} {TXT} Records}, booktitle = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2020, Genoa, Italy, September 7-11, 2020}, pages = {544--549}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuroSPW51379.2020.00080}, doi = {10.1109/EUROSPW51379.2020.00080}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/ToornRFLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/YazdaniTS20, author = {Ramin Yazdani and Olivier van der Toorn and Anna Sperotto}, title = {A Case of Identity: Detection of Suspicious {IDN} Homograph Domains Using Active {DNS} Measurements}, booktitle = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2020, Genoa, Italy, September 7-11, 2020}, pages = {559--564}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuroSPW51379.2020.00082}, doi = {10.1109/EUROSPW51379.2020.00082}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/YazdaniTS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/SommeseBAJRDCS20, author = {Raffaele Sommese and Leandro Marcio Bertholdo and Gautam Akiwate and Mattijs Jonker and Roland van Rijswijk{-}Deij and Alberto Dainotti and kc claffy and Anna Sperotto}, title = {MAnycast2: Using Anycast to Measure Anycast}, booktitle = {{IMC} '20: {ACM} Internet Measurement Conference, Virtual Event, USA, October 27-29, 2020}, pages = {456--463}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3419394.3423646}, doi = {10.1145/3419394.3423646}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/SommeseBAJRDCS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/DietzDSP20, author = {Christian Dietz and Gabi Dreo and Anna Sperotto and Aiko Pras}, title = {Towards Adversarial Resilience in Proactive Detection of Botnet Domain Names by using {MTD}}, booktitle = {{NOMS} 2020 - {IEEE/IFIP} Network Operations and Management Symposium, Budapest, Hungary, April 20-24, 2020}, pages = {1--5}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/NOMS47738.2020.9110332}, doi = {10.1109/NOMS47738.2020.9110332}, timestamp = {Mon, 15 Jun 2020 11:49:54 +0200}, biburl = {https://dblp.org/rec/conf/noms/DietzDSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/JonkerSP20, author = {Mattijs Jonker and Anna Sperotto and Aiko Pras}, title = {DDoS Mitigation: {A} Measurement-Based Approach}, booktitle = {{NOMS} 2020 - {IEEE/IFIP} Network Operations and Management Symposium, Budapest, Hungary, April 20-24, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/NOMS47738.2020.9110320}, doi = {10.1109/NOMS47738.2020.9110320}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/noms/JonkerSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/SteinbergerSBP20, author = {Jessica Steinberger and Anna Sperotto and Harald Baier and Aiko Pras}, title = {Distributed DDoS Defense: {A} collaborative Approach at Internet Scale}, booktitle = {{NOMS} 2020 - {IEEE/IFIP} Network Operations and Management Symposium, Budapest, Hungary, April 20-24, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/NOMS47738.2020.9110300}, doi = {10.1109/NOMS47738.2020.9110300}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/noms/SteinbergerSBP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pam/SommeseMJRDCS20, author = {Raffaele Sommese and Giovane C. M. Moura and Mattijs Jonker and Roland van Rijswijk{-}Deij and Alberto Dainotti and Kimberly C. Claffy and Anna Sperotto}, editor = {Anna Sperotto and Alberto Dainotti and Burkhard Stiller}, title = {When Parents and Children Disagree: Diving into {DNS} Delegation Inconsistency}, booktitle = {Passive and Active Measurement - 21st International Conference, {PAM} 2020, Eugene, Oregon, USA, March 30-31, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12048}, pages = {175--189}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-44081-7\_11}, doi = {10.1007/978-3-030-44081-7\_11}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pam/SommeseMJRDCS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pam/2020, editor = {Anna Sperotto and Alberto Dainotti and Burkhard Stiller}, title = {Passive and Active Measurement - 21st International Conference, {PAM} 2020, Eugene, Oregon, USA, March 30-31, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12048}, publisher = {Springer}, year = {2020}, note = {Due to the global outbreak of COVID-19, the {PAM} 2020 conference was organized as a virtual meeting.}, url = {https://doi.org/10.1007/978-3-030-44081-7}, doi = {10.1007/978-3-030-44081-7}, isbn = {978-3-030-44080-0}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pam/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/HofstedePSR18, author = {Rick Hofstede and Aiko Pras and Anna Sperotto and Gabi Dreo Rodosek}, title = {Flow-Based Compromise Detection: Lessons Learned}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {1}, pages = {82--89}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1331021}, doi = {10.1109/MSP.2018.1331021}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/HofstedePSR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aims/ToornS18, author = {Olivier van der Toorn and Anna Sperotto}, editor = {Burkhard Stiller}, title = {Threat Identification Using Active {DNS} Measurements}, booktitle = {12th International Conference on Autonomous Infrastructure, Management and Security, {AIMS} 2018, Munich, Germany, June 4-5, 2018, Proceedings}, pages = {1--5}, publisher = {{IFIP}}, year = {2018}, url = {http://www.aims-conference.org/2018/AIMS-2018-Proceedings.pdf\#page=9}, timestamp = {Thu, 12 Mar 2020 11:30:46 +0100}, biburl = {https://dblp.org/rec/conf/aims/ToornS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/JonkerPDS18, author = {Mattijs Jonker and Aiko Pras and Alberto Dainotti and Anna Sperotto}, title = {A First Joint Look at DoS Attacks and {BGP} Blackholing in the Wild}, booktitle = {Proceedings of the Internet Measurement Conference 2018, {IMC} 2018, Boston, MA, USA, October 31 - November 02, 2018}, pages = {457--463}, publisher = {{ACM}}, year = {2018}, url = {https://dl.acm.org/citation.cfm?id=3278571}, timestamp = {Fri, 25 Oct 2019 09:51:49 +0200}, biburl = {https://dblp.org/rec/conf/imc/JonkerPDS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nof/DietzCSWASP18, author = {Christian Dietz and Raphael Labaca Castro and Jessica Steinberger and Cezary Wilczak and Marcel Antzek and Anna Sperotto and Aiko Pras}, editor = {Filip Idzikowski and Prosper Chemouil and Adrian Kliks and Daphn{\'{e}} Tuncer and Marcin Rodziewicz}, title = {IoT-Botnet Detection and Isolation by Access Routers}, booktitle = {9th International Conference on the Network of the Future, {NOF} 2018, Poznan, Poland, November 19-21, 2018}, pages = {88--95}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NOF.2018.8598138}, doi = {10.1109/NOF.2018.8598138}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/nof/DietzCSWASP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/SteinbergerKDBS18, author = {Jessica Steinberger and Benjamin Kuhnert and Christian Dietz and Lisa Ball and Anna Sperotto and Harald Baier and Aiko Pras and Gabi Dreo}, title = {DDoS defense using {MTD} and {SDN}}, booktitle = {2018 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2018, Taipei, Taiwan, April 23-27, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NOMS.2018.8406221}, doi = {10.1109/NOMS.2018.8406221}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/noms/SteinbergerKDBS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/ToornRGS18, author = {Olivier van der Toorn and Roland van Rijswijk{-}Deij and Bart Geesink and Anna Sperotto}, title = {Melting the snow: Using active {DNS} measurements to detect snowshoe spam domains}, booktitle = {2018 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2018, Taipei, Taiwan, April 23-27, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NOMS.2018.8406222}, doi = {10.1109/NOMS.2018.8406222}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/noms/ToornRGS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/SantannaSTSGP17, author = {Jos{\'{e}} Jair Santanna and Ricardo de Oliveira Schmidt and Daphn{\'{e}} Tuncer and Anna Sperotto and Lisandro Zambenedetti Granville and Aiko Pras}, title = {Quiet Dogs Can Bite: Which Booters Should We Go After, and What Are Our Mitigation Options?}, journal = {{IEEE} Commun. Mag.}, volume = {55}, number = {7}, pages = {50--56}, year = {2017}, url = {https://doi.org/10.1109/MCOM.2017.1600992}, doi = {10.1109/MCOM.2017.1600992}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/SantannaSTSGP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnsm/HofstedeJSP17, author = {Rick Hofstede and Mattijs Jonker and Anna Sperotto and Aiko Pras}, title = {Flow-Based Web Application Brute-Force Attack and Compromise Detection}, journal = {J. Netw. Syst. Manag.}, volume = {25}, number = {4}, pages = {735--758}, year = {2017}, url = {https://doi.org/10.1007/s10922-017-9421-4}, doi = {10.1007/S10922-017-9421-4}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnsm/HofstedeJSP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/Rijswijk-DeijHS17, author = {Roland van Rijswijk{-}Deij and Kaspar Hageman and Anna Sperotto and Aiko Pras}, title = {The Performance Impact of Elliptic Curve Cryptography on {DNSSEC} Validation}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {25}, number = {2}, pages = {738--750}, year = {2017}, url = {https://doi.org/10.1109/TNET.2016.2605767}, doi = {10.1109/TNET.2016.2605767}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ton/Rijswijk-DeijHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsm/JonkerS17, author = {Mattijs Jonker and Anna Sperotto}, title = {Measuring exposure in DDoS protection services}, booktitle = {13th International Conference on Network and Service Management, {CNSM} 2017, Tokyo, Japan, November 26-30, 2017}, pages = {1--9}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.23919/CNSM.2017.8255991}, doi = {10.23919/CNSM.2017.8255991}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/cnsm/JonkerS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/JonkerKKRSD17, author = {Mattijs Jonker and Alistair King and Johannes Krupp and Christian Rossow and Anna Sperotto and Alberto Dainotti}, editor = {Steve Uhlig and Olaf Maennel}, title = {Millions of targets under attack: a macroscopic characterization of the DoS ecosystem}, booktitle = {Proceedings of the 2017 Internet Measurement Conference, {IMC} 2017, London, United Kingdom, November 1-3, 2017}, pages = {100--113}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3131365.3131383}, doi = {10.1145/3131365.3131383}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/JonkerKKRSD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/BajpaiKOSST17, author = {Vaibhav Bajpai and Mirja K{\"{u}}hlewind and J{\"{o}}rg Ott and J{\"{u}}rgen Sch{\"{o}}nw{\"{a}}lder and Anna Sperotto and Brian Trammell}, title = {Challenges with Reproducibility}, booktitle = {Proceedings of the Reproducibility Workshop, Reproducibility@SIGCOMM 2017, Los Angeles, CA, USA, August 25, 2017}, pages = {1--4}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3097766.3097767}, doi = {10.1145/3097766.3097767}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/BajpaiKOSST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/SperottoTR17, author = {Anna Sperotto and Olivier van der Toorn and Roland van Rijswijk{-}Deij}, editor = {Jeff Burke and Matthias W{\"{a}}hlisch and Nicholas Zhang and David Meyer and Puneet Sharma}, title = {{TIDE:} Threat Identification Using Active {DNS} Measurements}, booktitle = {Posters and Demos Proceedings of the Conference of the {ACM} Special Interest Group on Data Communication, {SIGCOMM} 2017, Los Angeles, CA, USA, August 21-25, 2017}, pages = {65--67}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3123878.3131988}, doi = {10.1145/3123878.3131988}, timestamp = {Mon, 29 Nov 2021 07:58:21 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/SperottoTR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/Rijswijk-DeijJS16, author = {Roland van Rijswijk{-}Deij and Mattijs Jonker and Anna Sperotto and Aiko Pras}, title = {A High-Performance, Scalable Infrastructure for Large-Scale Active {DNS} Measurements}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {34}, number = {6}, pages = {1877--1888}, year = {2016}, url = {https://doi.org/10.1109/JSAC.2016.2558918}, doi = {10.1109/JSAC.2016.2558918}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsac/Rijswijk-DeijJS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aims/SteinbergerKSBP16, author = {Jessica Steinberger and Benjamin Kuhnert and Anna Sperotto and Harald Baier and Aiko Pras}, editor = {R{\'{e}}mi Badonnel and Robert Koch and Aiko Pras and Martin Drasar and Burkhard Stiller}, title = {In Whom Do We Trust - Sharing Security Events}, booktitle = {Management and Security in the Age of Hyperconnectivity - 10th {IFIP} {WG} 6.6 International Conference on Autonomous Infrastructure, Management, and Security, {AIMS} 2016, Munich, Germany, June 20-23, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9701}, pages = {111--124}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39814-3\_11}, doi = {10.1007/978-3-319-39814-3\_11}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/aims/SteinbergerKSBP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aims/DietzSDP16, author = {Christian Dietz and Anna Sperotto and Gabi Dreo and Aiko Pras}, editor = {R{\'{e}}mi Badonnel and Robert Koch and Aiko Pras and Martin Drasar and Burkhard Stiller}, title = {How to Achieve Early Botnet Detection at the Provider Level?}, booktitle = {Management and Security in the Age of Hyperconnectivity - 10th {IFIP} {WG} 6.6 International Conference on Autonomous Infrastructure, Management, and Security, {AIMS} 2016, Munich, Germany, June 20-23, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9701}, pages = {142--146}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39814-3\_15}, doi = {10.1007/978-3-319-39814-3\_15}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aims/DietzSDP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsm/Rijswijk-DeijJS16, author = {Roland van Rijswijk{-}Deij and Mattijs Jonker and Anna Sperotto}, title = {On the adoption of the elliptic curve digital signature algorithm {(ECDSA)} in {DNSSEC}}, booktitle = {12th International Conference on Network and Service Management, {CNSM} 2016, Montreal, QC, Canada, October 31 - Nov. 4, 2016}, pages = {258--262}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNSM.2016.7818428}, doi = {10.1109/CNSM.2016.7818428}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnsm/Rijswijk-DeijJS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/JonkerSRSP16, author = {Mattijs Jonker and Anna Sperotto and Roland van Rijswijk{-}Deij and Ramin Sadre and Aiko Pras}, editor = {Phillipa Gill and John S. Heidemann and John W. Byers and Ramesh Govindan}, title = {Measuring the Adoption of DDoS Protection Services}, booktitle = {Proceedings of the 2016 {ACM} on Internet Measurement Conference, {IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016}, pages = {279--285}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2987487}, timestamp = {Tue, 06 Nov 2018 11:07:19 +0100}, biburl = {https://dblp.org/rec/conf/imc/JonkerSRSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmb/PrasSSS16, author = {Aiko Pras and Jos{\'{e}} Jair Santanna and Jessica Steinberger and Anna Sperotto}, editor = {Anne Remke and Boudewijn R. Haverkort}, title = {DDoS 3.0 - How Terrorists Bring Down the Internet}, booktitle = {Measurement, Modelling and Evaluation of Dependable Computer and Communication Systems - 18th International {GI/ITG} Conference, {MMB} {\&} {DFT} 2016, M{\"{u}}nster, Germany, April 4-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9629}, pages = {1--4}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-31559-1\_1}, doi = {10.1007/978-3-319-31559-1\_1}, timestamp = {Sat, 19 Oct 2019 20:11:41 +0200}, biburl = {https://dblp.org/rec/conf/mmb/PrasSSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/SteinbergerKSBP16, author = {Jessica Steinberger and Benjamin Kuhnert and Anna Sperotto and Harald Baier and Aiko Pras}, editor = {Sema Oktug and Mehmet Ulema and Cicek Cavdar and Lisandro Zambenedetti Granville and Carlos Raniery Paula dos Santos}, title = {Collaborative DDoS defense using flow-based security event information}, booktitle = {2016 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2016, Istanbul, Turkey, April 25-29, 2016}, pages = {516--522}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NOMS.2016.7502852}, doi = {10.1109/NOMS.2016.7502852}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/noms/SteinbergerKSBP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/Rijswijk-DeijSP15, author = {Roland van Rijswijk{-}Deij and Anna Sperotto and Aiko Pras}, title = {Making the Case for Elliptic Curves in {DNSSEC}}, journal = {Comput. Commun. Rev.}, volume = {45}, number = {5}, pages = {13--19}, year = {2015}, url = {https://doi.org/10.1145/2831347.2831350}, doi = {10.1145/2831347.2831350}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccr/Rijswijk-DeijSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/SperottoHDSR15, author = {Anna Sperotto and Rick Hofstede and Alberto Dainotti and Corinna Schmitt and Gabi Dreo Rodosek}, title = {Special issue on measure, detect and mitigate-challenges and trends in network security}, journal = {Int. J. Netw. Manag.}, volume = {25}, number = {5}, pages = {261--262}, year = {2015}, url = {https://doi.org/10.1002/nem.1905}, doi = {10.1002/NEM.1905}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/SperottoHDSR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnsm/DragoHSSP15, author = {Idilio Drago and Rick Hofstede and Ramin Sadre and Anna Sperotto and Aiko Pras}, title = {Measuring Cloud Service Health Using NetFlow/IPFIX: The WikiLeaks Case}, journal = {J. Netw. Syst. Manag.}, volume = {23}, number = {1}, pages = {58--88}, year = {2015}, url = {https://doi.org/10.1007/s10922-013-9278-0}, doi = {10.1007/S10922-013-9278-0}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnsm/DragoHSSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnsm/SperottoDLCFVC15, author = {Anna Sperotto and Guillaume Doyen and Steven Latr{\'{e}} and Marinos Charalambides and Jeroen Famaey and Petr Velan and Pavel Celeda}, title = {Report on the 8th International Conference on Autonomous Infrastructure, Management, and Security {(AIMS} 2014) - Monitoring and Securing Virtualized Networks and Services}, journal = {J. Netw. Syst. Manag.}, volume = {23}, number = {3}, pages = {794--802}, year = {2015}, url = {https://doi.org/10.1007/s10922-015-9346-8}, doi = {10.1007/S10922-015-9346-8}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnsm/SperottoDLCFVC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/SchmidtSSBP15, author = {Ricardo de Oliveira Schmidt and Ramin Sadre and Anna Sperotto and Hans van den Berg and Aiko Pras}, title = {Impact of Packet Sampling on Link Dimensioning}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {12}, number = {3}, pages = {392--405}, year = {2015}, url = {https://doi.org/10.1109/TNSM.2015.2436365}, doi = {10.1109/TNSM.2015.2436365}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/SchmidtSSBP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aims/VriesSSP15, author = {Wouter Willem de Vries and Jos{\'{e}} Jair Santanna and Anna Sperotto and Aiko Pras}, editor = {Steven Latr{\'{e}} and Marinos Charalambides and J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and Corinna Schmitt and Burkhard Stiller}, title = {How Asymmetric Is the Internet? - {A} Study to Support the Use of Traceroute}, booktitle = {Intelligent Mechanisms for Network Configuration and Security - 9th {IFIP} {WG} 6.6 International Conference on Autonomous Infrastructure, Management, and Security, {AIMS} 2015, Ghent, Belgium, June 22-25, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9122}, pages = {113--125}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20034-7\_12}, doi = {10.1007/978-3-319-20034-7\_12}, timestamp = {Mon, 01 May 2023 13:01:37 +0200}, biburl = {https://dblp.org/rec/conf/aims/VriesSSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aims/JonkerS15, author = {Mattijs Jonker and Anna Sperotto}, editor = {Steven Latr{\'{e}} and Marinos Charalambides and J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and Corinna Schmitt and Burkhard Stiller}, title = {Mitigating DDoS Attacks Using OpenFlow-Based Software Defined Networking}, booktitle = {Intelligent Mechanisms for Network Configuration and Security - 9th {IFIP} {WG} 6.6 International Conference on Autonomous Infrastructure, Management, and Security, {AIMS} 2015, Ghent, Belgium, June 22-25, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9122}, pages = {129--133}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20034-7\_13}, doi = {10.1007/978-3-319-20034-7\_13}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aims/JonkerS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aims/HendriksSP15, author = {Luuk Hendriks and Anna Sperotto and Aiko Pras}, editor = {Steven Latr{\'{e}} and Marinos Charalambides and J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and Corinna Schmitt and Burkhard Stiller}, title = {Characterizing the IPv6 Security Landscape by Large-Scale Measurements}, booktitle = {Intelligent Mechanisms for Network Configuration and Security - 9th {IFIP} {WG} 6.6 International Conference on Autonomous Infrastructure, Management, and Security, {AIMS} 2015, Ghent, Belgium, June 22-25, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9122}, pages = {145--149}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20034-7\_16}, doi = {10.1007/978-3-319-20034-7\_16}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aims/HendriksSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/SantannaRHSWGP15, author = {Jos{\'{e}} Jair Santanna and Roland van Rijswijk{-}Deij and Rick Hofstede and Anna Sperotto and Mark Wierbosch and Lisandro Zambenedetti Granville and Aiko Pras}, editor = {Remi Badonnel and Jin Xiao and Shingo Ata and Filip De Turck and Voicu Groza and Carlos Raniery Paula dos Santos}, title = {Booters - An analysis of DDoS-as-a-service attacks}, booktitle = {{IFIP/IEEE} International Symposium on Integrated Network Management, {IM} 2015, Ottawa, ON, Canada, 11-15 May, 2015}, pages = {243--251}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INM.2015.7140298}, doi = {10.1109/INM.2015.7140298}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/im/SantannaRHSWGP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/SteinbergerSGB15, author = {Jessica Steinberger and Anna Sperotto and Mario Golling and Harald Baier}, editor = {Remi Badonnel and Jin Xiao and Shingo Ata and Filip De Turck and Voicu Groza and Carlos Raniery Paula dos Santos}, title = {How to exchange security events? Overview and evaluation of formats and protocols}, booktitle = {{IFIP/IEEE} International Symposium on Integrated Network Management, {IM} 2015, Ottawa, ON, Canada, 11-15 May, 2015}, pages = {261--269}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INM.2015.7140300}, doi = {10.1109/INM.2015.7140300}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/im/SteinbergerSGB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/JonkerHSP15, author = {Mattijs Jonker and Rick Hofstede and Anna Sperotto and Aiko Pras}, editor = {Remi Badonnel and Jin Xiao and Shingo Ata and Filip De Turck and Voicu Groza and Carlos Raniery Paula dos Santos}, title = {Unveiling flat traffic on the Internet: An {SSH} attack case study}, booktitle = {{IFIP/IEEE} International Symposium on Integrated Network Management, {IM} 2015, Ottawa, ON, Canada, 11-15 May, 2015}, pages = {270--278}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INM.2015.7140301}, doi = {10.1109/INM.2015.7140301}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/im/JonkerHSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/SantannaDSP15, author = {Jos{\'{e}} Jair Santanna and Romain Durban and Anna Sperotto and Aiko Pras}, editor = {Remi Badonnel and Jin Xiao and Shingo Ata and Filip De Turck and Voicu Groza and Carlos Raniery Paula dos Santos}, title = {Inside booters: An analysis on operational databases}, booktitle = {{IFIP/IEEE} International Symposium on Integrated Network Management, {IM} 2015, Ottawa, ON, Canada, 11-15 May, 2015}, pages = {432--440}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INM.2015.7140320}, doi = {10.1109/INM.2015.7140320}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/im/SantannaDSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/ToornHJS15, author = {Olivier van der Toorn and Rick Hofstede and Mattijs Jonker and Anna Sperotto}, editor = {Remi Badonnel and Jin Xiao and Shingo Ata and Filip De Turck and Voicu Groza and Carlos Raniery Paula dos Santos}, title = {A first look at {HTTP(S)} intrusion detection using NetFlow/IPFIX}, booktitle = {{IFIP/IEEE} International Symposium on Integrated Network Management, {IM} 2015, Ottawa, ON, Canada, 11-15 May, 2015}, pages = {862--865}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INM.2015.7140395}, doi = {10.1109/INM.2015.7140395}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/im/ToornHJS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/SteinbergerSBP15, author = {Jessica Steinberger and Anna Sperotto and Harald Baier and Aiko Pras}, editor = {Remi Badonnel and Jin Xiao and Shingo Ata and Filip De Turck and Voicu Groza and Carlos Raniery Paula dos Santos}, title = {Collaborative attack mitigation and response: {A} survey}, booktitle = {{IFIP/IEEE} International Symposium on Integrated Network Management, {IM} 2015, Ottawa, ON, Canada, 11-15 May, 2015}, pages = {910--913}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INM.2015.7140407}, doi = {10.1109/INM.2015.7140407}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/im/SteinbergerSBP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/SteegHSP15, author = {Daniel van der Steeg and Rick Hofstede and Anna Sperotto and Aiko Pras}, editor = {Remi Badonnel and Jin Xiao and Shingo Ata and Filip De Turck and Voicu Groza and Carlos Raniery Paula dos Santos}, title = {Real-time DDoS attack detection for Cisco {IOS} using NetFlow}, booktitle = {{IFIP/IEEE} International Symposium on Integrated Network Management, {IM} 2015, Ottawa, ON, Canada, 11-15 May, 2015}, pages = {972--977}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INM.2015.7140420}, doi = {10.1109/INM.2015.7140420}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/im/SteegHSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/Rijswijk-DeijJS15, author = {Roland van Rijswijk{-}Deij and Mattijs Jonker and Anna Sperotto and Aiko Pras}, editor = {Steve Uhlig and Olaf Maennel and Brad Karp and Jitendra Padhye}, title = {The Internet of Names: {A} {DNS} Big Dataset}, booktitle = {Proceedings of the 2015 {ACM} Conference on Special Interest Group on Data Communication, {SIGCOMM} 2015, London, United Kingdom, August 17-21, 2015}, pages = {91--92}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2785956.2789996}, doi = {10.1145/2785956.2789996}, timestamp = {Wed, 21 Jul 2021 16:09:54 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/Rijswijk-DeijJS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/HofstedeHSP14, author = {Rick Hofstede and Luuk Hendriks and Anna Sperotto and Aiko Pras}, title = {{SSH} Compromise Detection using NetFlow/IPFIX}, journal = {Comput. Commun. Rev.}, volume = {44}, number = {5}, pages = {20--26}, year = {2014}, url = {https://doi.org/10.1145/2677046.2677050}, doi = {10.1145/2677046.2677050}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/HofstedeHSP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SchmidtSSBP14, author = {Ricardo de Oliveira Schmidt and Ramin Sadre and Anna Sperotto and Hans van den Berg and Aiko Pras}, title = {A hybrid procedure for efficient link dimensioning}, journal = {Comput. Networks}, volume = {67}, pages = {252--269}, year = {2014}, url = {https://doi.org/10.1016/j.comnet.2014.04.008}, doi = {10.1016/J.COMNET.2014.04.008}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/SchmidtSSBP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/HofstedeCTDSSP14, author = {Rick Hofstede and Pavel Celeda and Brian Trammell and Idilio Drago and Ramin Sadre and Anna Sperotto and Aiko Pras}, title = {Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and {IPFIX}}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {16}, number = {4}, pages = {2037--2064}, year = {2014}, url = {https://doi.org/10.1109/COMST.2014.2321898}, doi = {10.1109/COMST.2014.2321898}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/HofstedeCTDSSP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/SadreSHB14, author = {Ramin Sadre and Anna Sperotto and Rick Hofstede and Nevil Brownlee}, title = {Flow-based Approaches in Network Management: Recent Advances and Future Trends}, journal = {Int. J. Netw. Manag.}, volume = {24}, number = {4}, pages = {219--220}, year = {2014}, url = {https://doi.org/10.1002/nem.1872}, doi = {10.1002/NEM.1872}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/SadreSHB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnsm/DoyenWSCGSS14, author = {Guillaume Doyen and Martin Waldburger and Anna Sperotto and Pavel Celeda and Juan{-}Luis Gorricho and Thomas Schaaf and Joan Serrat}, title = {Report on the 7th International Conference on Autonomous Infrastructure, Management, and Security {(AIMS} 2013): Emerging Management Mechanisms for the Future Internet}, journal = {J. Netw. Syst. Manag.}, volume = {22}, number = {2}, pages = {289--296}, year = {2014}, url = {https://doi.org/10.1007/s10922-013-9298-9}, doi = {10.1007/S10922-013-9298-9}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnsm/DoyenWSCGSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aims/SantannaS14, author = {Jos{\'{e}} Jair Santanna and Anna Sperotto}, editor = {Anna Sperotto and Guillaume Doyen and Steven Latr{\'{e}} and Marinos Charalambides and Burkhard Stiller}, title = {Characterizing and Mitigating the DDoS-as-a-Service Phenomenon}, booktitle = {Monitoring and Securing Virtualized Networks and Services - 8th {IFIP} {WG} 6.6 International Conference on Autonomous Infrastructure, Management, and Security, {AIMS} 2014, Brno, Czech Republic, June 30 - July 3, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8508}, pages = {74--78}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43862-6\_10}, doi = {10.1007/978-3-662-43862-6\_10}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/aims/SantannaS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aims/KerkersSS14, author = {Max Kerkers and Jos{\'{e}} Jair Santanna and Anna Sperotto}, editor = {Anna Sperotto and Guillaume Doyen and Steven Latr{\'{e}} and Marinos Charalambides and Burkhard Stiller}, title = {Characterisation of the Kelihos.B Botnet}, booktitle = {Monitoring and Securing Virtualized Networks and Services - 8th {IFIP} {WG} 6.6 International Conference on Autonomous Infrastructure, Management, and Security, {AIMS} 2014, Brno, Czech Republic, June 30 - July 3, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8508}, pages = {79--91}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43862-6\_11}, doi = {10.1007/978-3-662-43862-6\_11}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aims/KerkersSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aims/KarimzadehSP14, author = {Morteza Karimzadeh and Anna Sperotto and Aiko Pras}, editor = {Anna Sperotto and Guillaume Doyen and Steven Latr{\'{e}} and Marinos Charalambides and Burkhard Stiller}, title = {Software Defined Networking to Improve Mobility Management Performance}, booktitle = {Monitoring and Securing Virtualized Networks and Services - 8th {IFIP} {WG} 6.6 International Conference on Autonomous Infrastructure, Management, and Security, {AIMS} 2014, Brno, Czech Republic, June 30 - July 3, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8508}, pages = {118--122}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43862-6\_14}, doi = {10.1007/978-3-662-43862-6\_14}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aims/KarimzadehSP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip6-6/MaanSSB14, author = {Dirk Maan and Jos{\'{e}} Jair Santanna and Anna Sperotto and Pieter{-}Tjerk de Boer}, editor = {Yvon Kermarrec}, title = {Towards Validation of the Internet Census 2012}, booktitle = {Advances in Communication Networking - 20th {EUNICE/IFIP} {EG} 6.2, 6.6 International Workshop, Rennes, France, September 1-5, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8846}, pages = {85--96}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13488-8\_9}, doi = {10.1007/978-3-319-13488-8\_9}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/ifip6-6/MaanSSB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/Rijswijk-DeijSP14, author = {Roland van Rijswijk{-}Deij and Anna Sperotto and Aiko Pras}, editor = {Carey Williamson and Aditya Akella and Nina Taft}, title = {{DNSSEC} and its potential for DDoS attacks: a comprehensive measurement study}, booktitle = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014, Vancouver, BC, Canada, November 5-7, 2014}, pages = {449--460}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2663716.2663731}, doi = {10.1145/2663716.2663731}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/Rijswijk-DeijSP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/DietrichHPRSSWZ14, author = {Sven Dietrich and Jeroen van der Ham and Aiko Pras and Roland van Rijswijk{-}Deij and Darren Shou and Anna Sperotto and Aimee van Wynsberghe and Lenore D. Zuck}, title = {Ethics in Data Sharing: Developing a Model for Best Practice}, booktitle = {35. {IEEE} Security and Privacy Workshops, {SPW} 2014, San Jose, CA, USA, May 17-18, 2014}, pages = {5--9}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SPW.2014.43}, doi = {10.1109/SPW.2014.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/DietrichHPRSSWZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/aims/2014, editor = {Anna Sperotto and Guillaume Doyen and Steven Latr{\'{e}} and Marinos Charalambides and Burkhard Stiller}, title = {Monitoring and Securing Virtualized Networks and Services - 8th {IFIP} {WG} 6.6 International Conference on Autonomous Infrastructure, Management, and Security, {AIMS} 2014, Brno, Czech Republic, June 30 - July 3, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8508}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43862-6}, doi = {10.1007/978-3-662-43862-6}, isbn = {978-3-662-43861-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aims/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pik/DragoSHSKHP13, author = {Idilio Drago and Ricardo de Oliveira Schmidt and Rick Hofstede and Anna Sperotto and Morteza Karimzadeh and Boudewijn R. Haverkort and Aiko Pras}, title = {Networking for the Cloud: Challenges and Trends}, journal = {Prax. Inf.verarb. Kommun.}, volume = {36}, number = {4}, pages = {207--214}, year = {2013}, url = {https://doi.org/10.1515/pik-2013-0035}, doi = {10.1515/PIK-2013-0035}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pik/DragoSHSKHP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aims/EllensZSSMM13, author = {Wendy Ellens and Piotr Zuraniewski and Anna Sperotto and Harm Schotanus and Michel Mandjes and Erik Meeuwissen}, editor = {Guillaume Doyen and Martin Waldburger and Pavel Celeda and Anna Sperotto and Burkhard Stiller}, title = {Flow-Based Detection of {DNS} Tunnels}, booktitle = {Emerging Management Mechanisms for the Future Internet - 7th {IFIP} {WG} 6.6 International Conference on Autonomous Infrastructure, Management, and Security, {AIMS} 2013, Barcelona, Spain, June 25-28, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7943}, pages = {124--135}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38998-6\_16}, doi = {10.1007/978-3-642-38998-6\_16}, timestamp = {Fri, 27 Dec 2019 21:20:05 +0100}, biburl = {https://dblp.org/rec/conf/aims/EllensZSSMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsm/SchmidtSSP13, author = {Ricardo de Oliveira Schmidt and Ramin Sadre and Anna Sperotto and Aiko Pras}, title = {Lightweight link dimensioning using sFlow sampling}, booktitle = {Proceedings of the 9th International Conference on Network and Service Management, {CNSM} 2013, Zurich, Switzerland, October 14-18, 2013}, pages = {152--155}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CNSM.2013.6727827}, doi = {10.1109/CNSM.2013.6727827}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnsm/SchmidtSSP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsm/HofstedeBSP13, author = {Rick Hofstede and V{\'{a}}clav Bartos and Anna Sperotto and Aiko Pras}, title = {Towards real-time intrusion detection for NetFlow and {IPFIX}}, booktitle = {Proceedings of the 9th International Conference on Network and Service Management, {CNSM} 2013, Zurich, Switzerland, October 14-18, 2013}, pages = {227--234}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CNSM.2013.6727841}, doi = {10.1109/CNSM.2013.6727841}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnsm/HofstedeBSP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/MouraSSP13, author = {Giovane Cesar Moreira Moura and Anna Sperotto and Ramin Sadre and Aiko Pras}, editor = {Filip De Turck and Yixin Diao and Choong Seon Hong and Deep Medhi and Ramin Sadre}, title = {Evaluating third-party Bad Neighborhood blacklists for Spam detection}, booktitle = {2013 {IFIP/IEEE} International Symposium on Integrated Network Management {(IM} 2013), Ghent, Belgium, May 27-31, 2013}, pages = {252--259}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6572993/}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/im/MouraSSP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pam/HofstedeDSSP13, author = {Rick Hofstede and Idilio Drago and Anna Sperotto and Ramin Sadre and Aiko Pras}, editor = {Matthew Roughan and Rocky K. C. Chang}, title = {Measurement Artifacts in NetFlow Data}, booktitle = {Passive and Active Measurement - 14th International Conference, {PAM} 2013, Hong Kong, China, March 18-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7799}, pages = {1--10}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36516-4\_1}, doi = {10.1007/978-3-642-36516-4\_1}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/pam/HofstedeDSSP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/aims/2013, editor = {Guillaume Doyen and Martin Waldburger and Pavel Celeda and Anna Sperotto and Burkhard Stiller}, title = {Emerging Management Mechanisms for the Future Internet - 7th {IFIP} {WG} 6.6 International Conference on Autonomous Infrastructure, Management, and Security, {AIMS} 2013, Barcelona, Spain, June 25-28, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7943}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38998-6}, doi = {10.1007/978-3-642-38998-6}, isbn = {978-3-642-38997-9}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aims/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/SperottoMSBP12, author = {Anna Sperotto and Michel Mandjes and Ramin Sadre and Pieter{-}Tjerk de Boer and Aiko Pras}, title = {Autonomic Parameter Tuning of Anomaly-Based IDSs: an {SSH} Case Study}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {9}, number = {2}, pages = {128--141}, year = {2012}, url = {https://doi.org/10.1109/TNSM.2012.031512.110146}, doi = {10.1109/TNSM.2012.031512.110146}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/SperottoMSBP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aims/HellemonsHHSSP12, author = {Laurens Hellemons and Luuk Hendriks and Rick Hofstede and Anna Sperotto and Ramin Sadre and Aiko Pras}, editor = {Ramin Sadre and Jiri Novotn{\'{y}} and Pavel Celeda and Martin Waldburger and Burkhard Stiller}, title = {SSHCure: {A} Flow-Based {SSH} Intrusion Detection System}, booktitle = {Dependable Networks and Services - 6th {IFIP} {WG} 6.6 International Conference on Autonomous Infrastructure, Management, and Security, {AIMS} 2012, Luxembourg, Luxembourg, June 4-8, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7279}, pages = {86--97}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30633-4\_11}, doi = {10.1007/978-3-642-30633-4\_11}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/aims/HellemonsHHSSP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aims/SchmidtSSP12, author = {Ricardo de Oliveira Schmidt and Anna Sperotto and Ramin Sadre and Aiko Pras}, editor = {Ramin Sadre and Jiri Novotn{\'{y}} and Pavel Celeda and Martin Waldburger and Burkhard Stiller}, title = {Towards Bandwidth Estimation Using Flow-Level Measurements}, booktitle = {Dependable Networks and Services - 6th {IFIP} {WG} 6.6 International Conference on Autonomous Infrastructure, Management, and Security, {AIMS} 2012, Luxembourg, Luxembourg, June 4-8, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7279}, pages = {127--138}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30633-4\_18}, doi = {10.1007/978-3-642-30633-4\_18}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aims/SchmidtSSP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/DragoMMSSP12, author = {Idilio Drago and Marco Mellia and Maurizio M. Munaf{\`{o}} and Anna Sperotto and Ramin Sadre and Aiko Pras}, editor = {John W. Byers and Jim Kurose and Ratul Mahajan and Alex C. Snoeren}, title = {Inside dropbox: understanding personal cloud storage services}, booktitle = {Proceedings of the 12th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} '12, Boston, MA, USA, November 14-16, 2012}, pages = {481--494}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2398776.2398827}, doi = {10.1145/2398776.2398827}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/DragoMMSSP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/SadreSP12, author = {Ramin Sadre and Anna Sperotto and Aiko Pras}, editor = {Filip De Turck and Luciano Paschoal Gaspary and Deep Medhi}, title = {The effects of DDoS attacks on flow monitoring applications}, booktitle = {2012 {IEEE} Network Operations and Management Symposium, {NOMS} 2012, Maui, HI, USA, April 16-20, 2012}, pages = {269--277}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/NOMS.2012.6211908}, doi = {10.1109/NOMS.2012.6211908}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/noms/SadreSP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/MouraSSP12, author = {Giovane Cesar Moreira Moura and Ramin Sadre and Anna Sperotto and Aiko Pras}, editor = {Filip De Turck and Luciano Paschoal Gaspary and Deep Medhi}, title = {Internet bad neighborhoods aggregation}, booktitle = {2012 {IEEE} Network Operations and Management Symposium, {NOMS} 2012, Maui, HI, USA, April 16-20, 2012}, pages = {343--350}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/NOMS.2012.6211917}, doi = {10.1109/NOMS.2012.6211917}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/noms/MouraSSP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip6-6/HofstedeDSP11, author = {Rick Hofstede and Idilio Drago and Anna Sperotto and Aiko Pras}, editor = {Ralf Lehnert}, title = {Flow Monitoring Experiences at the Ethernet-Layer}, booktitle = {Energy-Aware Communications - 17th International Workshop, {EUNICE} 2011, Dresden, Germany, September 5-7, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6955}, pages = {134--145}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23541-2\_15}, doi = {10.1007/978-3-642-23541-2\_15}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/ifip6-6/HofstedeDSP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/SperottoP11, author = {Anna Sperotto and Aiko Pras}, editor = {Nazim Agoulmine and Claudio Bartolini and Tom Pfeifer and Declan O'Sullivan}, title = {Flow-based intrusion detection}, booktitle = {Proceedings of the 12th {IFIP/IEEE} International Symposium on Integrated Network Management, {IM} 2011, Dublin, Ireland, 23-27 May 2011}, pages = {958--963}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/INM.2011.5990529}, doi = {10.1109/INM.2011.5990529}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/im/SperottoP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Sperotto10, author = {Anna Sperotto}, title = {Flow-based intrusion detection}, school = {University of Twente, Enschede, Netherlands}, year = {2010}, url = {http://eprints.eemcs.utwente.nl/18649/}, timestamp = {Mon, 10 Apr 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/Sperotto10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/SperottoSSMPS10, author = {Anna Sperotto and Gregor Schaffrath and Ramin Sadre and Cristian Morariu and Aiko Pras and Burkhard Stiller}, title = {An Overview of {IP} Flow-Based Intrusion Detection}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {12}, number = {3}, pages = {343--356}, year = {2010}, url = {https://doi.org/10.1109/SURV.2010.032210.00054}, doi = {10.1109/SURV.2010.032210.00054}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/SperottoSSMPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip6-6/HofstedeSFP10, author = {Rick Hofstede and Anna Sperotto and Tiago Fioreze and Aiko Pras}, editor = {Finn Arve Aagesen and Svein J. Knapskog}, title = {The Network Data Handling War: MySQL vs. NfDump}, booktitle = {Networked Services and Applications - Engineering, Control and Management, 16th {EUNICE/IFIP} {WG} 6.6 Workshop, {EUNICE} 2010, Trondheim, Norway, June 28-30, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6164}, pages = {167--176}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13971-0\_16}, doi = {10.1007/978-3-642-13971-0\_16}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/ifip6-6/HofstedeSFP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnsm/PrasSSFHS09, author = {Aiko Pras and Ramin Sadre and Anna Sperotto and Tiago Fioreze and David Hausheer and J{\"{u}}rgen Sch{\"{o}}nw{\"{a}}lder}, title = {Using NetFlow/IPFIX for Network Management}, journal = {J. Netw. Syst. Manag.}, volume = {17}, number = {4}, pages = {482--487}, year = {2009}, url = {https://doi.org/10.1007/s10922-009-9138-0}, doi = {10.1007/S10922-009-9138-0}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnsm/PrasSSFHS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsom/SperottoSBP09, author = {Anna Sperotto and Ramin Sadre and Pieter{-}Tjerk de Boer and Aiko Pras}, editor = {Claudio Bartolini and Luciano Paschoal Gaspary}, title = {Hidden Markov Model Modeling of {SSH} Brute-Force Attacks}, booktitle = {Integrated Management of Systems, Services, Processes and People in IT, 20th {IFIP/IEEE} International Workshop on Distributed Systems: Operations and Management, {DSOM} 2009, Venice, Italy, October 27-28, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5841}, pages = {164--176}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04989-7\_13}, doi = {10.1007/978-3-642-04989-7\_13}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/dsom/SperottoSBP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip6-6/SperottoVSP09, author = {Anna Sperotto and Gert Vliek and Ramin Sadre and Aiko Pras}, editor = {Miquel Oliver and Sebasti{\`{a}} Sallent}, title = {Detecting Spam at the Network Level}, booktitle = {The Internet of the Future, 15th Open European Summer School and {IFIP} {TC6.6} Workshop, {EUNICE} 2009, Barcelona, Spain, September 7-9, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5733}, pages = {208--216}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03700-9\_22}, doi = {10.1007/978-3-642-03700-9\_22}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/ifip6-6/SperottoVSP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/FiorezeGPSS09, author = {Tiago Fioreze and Lisandro Zambenedetti Granville and Aiko Pras and Anna Sperotto and Ramin Sadre}, title = {Self-management of hybrid networks: Can we trust netflow data?}, booktitle = {Integrated Network Management, {IM} 2009. 11th {IFIP/IEEE} International Symposium on Integrated Network Management, Hofstra University, Long Island, NY, USA, June 1-5, 2009}, pages = {577--584}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/INM.2009.5188864}, doi = {10.1109/INM.2009.5188864}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/im/FiorezeGPSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipom/SperottoSVP09, author = {Anna Sperotto and Ramin Sadre and Frank E. van Vliet and Aiko Pras}, editor = {Giorgio Nunzi and Caterina M. Scoglio and Xing Li}, title = {A Labeled Data Set for Flow-Based Intrusion Detection}, booktitle = {{IP} Operations and Management, 9th {IEEE} International Workshop, {IPOM} 2009, Venice, Italy, October 29-30, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5843}, pages = {39--50}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04968-2\_4}, doi = {10.1007/978-3-642-04968-2\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ipom/SperottoSVP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipom/SperottoSP08, author = {Anna Sperotto and Ramin Sadre and Aiko Pras}, editor = {Nail Akar and Michal Pi{\'{o}}ro and Charalabos Skianis}, title = {Anomaly Characterization in Flow-Based Traffic Time Series}, booktitle = {{IP} Operations and Management, 8th {IEEE} International Workshop, {IPOM} 2008, Samos Island, Greece, September 22-26, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5275}, pages = {15--27}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87357-0\_2}, doi = {10.1007/978-3-540-87357-0\_2}, timestamp = {Sun, 02 Oct 2022 16:08:48 +0200}, biburl = {https://dblp.org/rec/conf/ipom/SperottoSP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aims/SperottoM07, author = {Anna Sperotto and Remco van de Meent}, editor = {Arosha K. Bandara and Mark Burgess}, title = {A Survey of the High-Speed Self-learning Intrusion Detection Research Area}, booktitle = {Inter-Domain Management, First International Conference on Autonomous Infrastructure, Management and Security, {AIMS} 2007, Oslo, Norway, June 21-22, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4543}, pages = {196--199}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72986-0\_24}, doi = {10.1007/978-3-540-72986-0\_24}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/aims/SperottoM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emmcvpr/SperottoP07, author = {Anna Sperotto and Marcello Pelillo}, editor = {Alan L. Yuille and Song Chun Zhu and Daniel Cremers and Yongtian Wang}, title = {Szemer{\'{e}}di's Regularity Lemma and Its Applications to Pairwise Clustering and Segmentation}, booktitle = {Energy Minimization Methods in Computer Vision and Pattern Recognition, 6th International Conference, {EMMCVPR} 2007, Ezhou, China, August 27-29, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4679}, pages = {13--27}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74198-5\_2}, doi = {10.1007/978-3-540-74198-5\_2}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/emmcvpr/SperottoP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.