BibTeX records: Anna Sperotto

download as .bib file

@inproceedings{DBLP:conf/pam/YazdaniJS24,
  author       = {Ramin Yazdani and
                  Mattijs Jonker and
                  Anna Sperotto},
  editor       = {Philipp Richter and
                  Vaibhav Bajpai and
                  Esteban Carisimo},
  title        = {Swamp of Reflectors: Investigating the Ecosystem of Open {DNS} Resolvers},
  booktitle    = {Passive and Active Measurement - 25th International Conference, {PAM}
                  2024, Virtual Event, March 11-13, 2024, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14538},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-56252-5\_1},
  doi          = {10.1007/978-3-031-56252-5\_1},
  timestamp    = {Fri, 29 Mar 2024 23:01:36 +0100},
  biburl       = {https://dblp.org/rec/conf/pam/YazdaniJS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsoft/TarahomiHS23,
  author       = {Sousan Tarahomi and
                  Ralph Holz and
                  Anna Sperotto},
  editor       = {Carlos J. Bernardos and
                  Barbara Martini and
                  Elisa Rojas and
                  F{\'{a}}bio Luciano Verdii and
                  Zuqing Zhu and
                  Eiji Oki and
                  Helge Parzyjegla},
  title        = {Quantifying Security Risks in Cloud Infrastructures: {A} Data-driven
                  Approach},
  booktitle    = {9th {IEEE} International Conference on Network Softwarization, NetSoft
                  2023, Madrid, Spain, June 19-23, 2023},
  pages        = {346--349},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/NetSoft57336.2023.10175501},
  doi          = {10.1109/NETSOFT57336.2023.10175501},
  timestamp    = {Thu, 20 Jul 2023 12:34:37 +0200},
  biburl       = {https://dblp.org/rec/conf/netsoft/TarahomiHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/KhanSHR23,
  author       = {Etienne Khan and
                  Anna Sperotto and
                  Jeroen van der Ham and
                  Roland van Rijswijk{-}Deij},
  editor       = {Anna Brunstr{\"{o}}m and
                  Marcel Flores and
                  Marco Fiore},
  title        = {Stranger VPNs: Investigating the Geo-Unblocking Capabilities of Commercial
                  {VPN} Providers},
  booktitle    = {Passive and Active Measurement - 24th International Conference, {PAM}
                  2023, Virtual Event, March 21-23, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13882},
  pages        = {46--68},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-28486-1\_3},
  doi          = {10.1007/978-3-031-28486-1\_3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/KhanSHR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tma/YazdaniNHKJS23,
  author       = {Ramin Yazdani and
                  Yevheniya Nosyk and
                  Ralph Holz and
                  Maciej Korczynski and
                  Mattijs Jonker and
                  Anna Sperotto},
  title        = {Hazardous Echoes: The {DNS} Resolvers that Should Be Put on Mute},
  booktitle    = {7th Network Traffic Measurement and Analysis Conference, {TMA} 2023,
                  Naples, Italy, June 26-29, 2023},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.23919/TMA58422.2023.10198955},
  doi          = {10.23919/TMA58422.2023.10198955},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tma/YazdaniNHKJS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csr/ToornMDHSR22,
  author       = {Olivier van der Toorn and
                  Moritz M{\"{u}}ller and
                  Sara Dickinson and
                  Cristian Hesselman and
                  Anna Sperotto and
                  Roland van Rijswijk{-}Deij},
  title        = {Addressing the challenges of modern {DNS} a comprehensive tutorial},
  journal      = {Comput. Sci. Rev.},
  volume       = {45},
  pages        = {100469},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cosrev.2022.100469},
  doi          = {10.1016/J.COSREV.2022.100469},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csr/ToornMDHSR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/ToornRSSJ22,
  author       = {Olivier van der Toorn and
                  Roland van Rijswijk{-}Deij and
                  Raffaele Sommese and
                  Anna Sperotto and
                  Mattijs Jonker},
  editor       = {Chadi Barakat and
                  Cristel Pelsser and
                  Theophilus A. Benson and
                  David R. Choffnes},
  title        = {Saving Brian's privacy: the perils of privacy exposure through reverse
                  {DNS}},
  booktitle    = {Proceedings of the 22nd {ACM} Internet Measurement Conference, {IMC}
                  2022, Nice, France, October 25-27, 2022},
  pages        = {1--13},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3517745.3561424},
  doi          = {10.1145/3517745.3561424},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/ToornRSSJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/SommesecRCDSJ22,
  author       = {Raffaele Sommese and
                  kc claffy and
                  Roland van Rijswijk{-}Deij and
                  Arnab Chattopadhyay and
                  Alberto Dainotti and
                  Anna Sperotto and
                  Mattijs Jonker},
  editor       = {Chadi Barakat and
                  Cristel Pelsser and
                  Theophilus A. Benson and
                  David R. Choffnes},
  title        = {Investigating the impact of DDoS attacks on {DNS} infrastructure},
  booktitle    = {Proceedings of the 22nd {ACM} Internet Measurement Conference, {IMC}
                  2022, Nice, France, October 25-27, 2022},
  pages        = {51--64},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3517745.3561458},
  doi          = {10.1145/3517745.3561458},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/SommesecRCDSJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/DietzADSP22,
  author       = {Christian Dietz and
                  Marcel Antzek and
                  Gabi Dreo and
                  Anna Sperotto and
                  Aiko Pras},
  title        = {{DMEF:} Dynamic Malware Evaluation Framework},
  booktitle    = {2022 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS}
                  2022, Budapest, Hungary, April 25-29, 2022},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/NOMS54207.2022.9789908},
  doi          = {10.1109/NOMS54207.2022.9789908},
  timestamp    = {Wed, 15 Jun 2022 16:45:18 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/DietzADSP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/YazdaniRJS22,
  author       = {Ramin Yazdani and
                  Roland van Rijswijk{-}Deij and
                  Mattijs Jonker and
                  Anna Sperotto},
  editor       = {Oliver Hohlfeld and
                  Giovane Cesar Moreira Moura and
                  Cristel Pelsser},
  title        = {A Matter of Degree: Characterizing the Amplification Power of Open
                  {DNS} Resolvers},
  booktitle    = {Passive and Active Measurement - 23rd International Conference, {PAM}
                  2022, Virtual Event, March 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13210},
  pages        = {293--318},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-98785-5\_13},
  doi          = {10.1007/978-3-030-98785-5\_13},
  timestamp    = {Wed, 16 Aug 2023 21:16:31 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/YazdaniRJS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/YazdaniHHRDSJ22,
  author       = {Ramin Yazdani and
                  Alden Hilton and
                  Jeroen van der Ham and
                  Roland van Rijswijk{-}Deij and
                  Casey T. Deccio and
                  Anna Sperotto and
                  Mattijs Jonker},
  title        = {Mirrors in the Sky: On the Potential of Clouds in {DNS} Reflection-based
                  Denial-of-Service Attacks},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {263--275},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545959},
  doi          = {10.1145/3545948.3545959},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/YazdaniHHRDSJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tma/2022,
  editor       = {Roya Ensafi and
                  Andra Lutu and
                  Anna Sperotto and
                  Roland van Rijswijk{-}Deij},
  title        = {6th Network Traffic Measurement and Analysis Conference, {TMA} 2022,
                  Enschede, The Netherlands, June 27-30, 2022},
  publisher    = {{IFIP}},
  year         = {2022},
  url          = {https://dl.ifip.org/db/conf/tma/tma2022/index.html},
  isbn         = {978-3-903176-47-8},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tma/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-01160,
  author       = {Olivier van der Toorn and
                  Raffaele Sommese and
                  Anna Sperotto and
                  Roland van Rijswijk{-}Deij and
                  Mattijs Jonker},
  title        = {Saving Brian's Privacy: the Perils of Privacy Exposure through Reverse
                  {DNS}},
  journal      = {CoRR},
  volume       = {abs/2202.01160},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.01160},
  eprinttype    = {arXiv},
  eprint       = {2202.01160},
  timestamp    = {Wed, 09 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-01160.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsm/ToornKJRRS21,
  author       = {Olivier van der Toorn and
                  Johannes Krupp and
                  Mattijs Jonker and
                  Roland van Rijswijk{-}Deij and
                  Christian Rossow and
                  Anna Sperotto},
  editor       = {Prosper Chemouil and
                  Mehmet Ulema and
                  Stuart Clayman and
                  M{\"{u}}ge Sayit and
                  Cihat {\c{C}}etinkaya and
                  Stefano Secci},
  title        = {ANYway: Measuring the Amplification DDoS Potential of Domains},
  booktitle    = {17th International Conference on Network and Service Management, {CNSM}
                  2021, Izmir, Turkey, October 25-29, 2021},
  pages        = {500--508},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.23919/CNSM52442.2021.9615596},
  doi          = {10.23919/CNSM52442.2021.9615596},
  timestamp    = {Sun, 02 Oct 2022 15:57:41 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsm/ToornKJRRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tma/SommeseAJMDRVSC21,
  author       = {Raffaele Sommese and
                  Gautam Akiwate and
                  Mattijs Jonker and
                  Giovane C. M. Moura and
                  Marco Davids and
                  Roland van Rijswijk{-}Deij and
                  Geoffrey M. Voelker and
                  Stefan Savage and
                  Kimberly C. Claffy and
                  Anna Sperotto},
  editor       = {Vaibhav Bajpai and
                  Hamed Haddadi and
                  Oliver Hohlfeld},
  title        = {Characterization of Anycast Adoption in the {DNS} Authoritative Infrastructure},
  booktitle    = {5th Network Traffic Measurement and Analysis Conference, {TMA} 2021,
                  Virtual Event, September 14-15, 2021},
  publisher    = {{IFIP}},
  year         = {2021},
  url          = {http://dl.ifip.org/db/conf/tma/tma2021/tma2021-paper1.pdf},
  timestamp    = {Fri, 01 Oct 2021 09:02:23 +0200},
  biburl       = {https://dblp.org/rec/conf/tma/SommeseAJMDRVSC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/MisaGHDSDR20,
  author       = {Chris Misa and
                  Dennis Guse and
                  Oliver Hohlfeld and
                  Ramakrishnan Durairajan and
                  Anna Sperotto and
                  Alberto Dainotti and
                  Reza Rejaie},
  title        = {Lessons learned organizing the {PAM} 2020 virtual conference},
  journal      = {Comput. Commun. Rev.},
  volume       = {50},
  number       = {3},
  pages        = {46--54},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411740.3411747},
  doi          = {10.1145/3411740.3411747},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ccr/MisaGHDSDR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/HolzMBHCGACKRSV20,
  author       = {Ralph Holz and
                  Marco Mellia and
                  Olivier Bonaventure and
                  Hamed Haddadi and
                  Matthew Caesar and
                  Sergey Gorinsky and
                  Gianni Antichi and
                  Joseph Camp and
                  kc claffy and
                  Bhaskaran Raman and
                  Anna Sperotto and
                  Aline Carneiro Viana and
                  Steve Uhlig},
  title        = {Update on {ACM} {SIGCOMM} {CCR} reviewing process: towards a more
                  open review process},
  journal      = {Comput. Commun. Rev.},
  volume       = {50},
  number       = {3},
  pages        = {55--56},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411740.3411748},
  doi          = {10.1145/3411740.3411748},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/HolzMBHCGACKRSV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/HesselmanGHKXJR20,
  author       = {Cristian Hesselman and
                  Paola Grosso and
                  Ralph Holz and
                  Fernando Kuipers and
                  Janet Hui Xue and
                  Mattijs Jonker and
                  Joeri de Ruiter and
                  Anna Sperotto and
                  Roland van Rijswijk{-}Deij and
                  Giovane C. M. Moura and
                  Aiko Pras and
                  Cees de Laat},
  title        = {A Responsible Internet to Increase Trust in the Digital World},
  journal      = {J. Netw. Syst. Manag.},
  volume       = {28},
  number       = {4},
  pages        = {882--922},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10922-020-09564-7},
  doi          = {10.1007/S10922-020-09564-7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnsm/HesselmanGHKXJR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/SommeseJRDCS20,
  author       = {Raffaele Sommese and
                  Mattijs Jonker and
                  Roland van Rijswijk{-}Deij and
                  Alberto Dainotti and
                  Kimberly C. Claffy and
                  Anna Sperotto},
  title        = {The Forgotten Side of {DNS:} Orphan and Abandoned Records},
  booktitle    = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P
                  Workshops 2020, Genoa, Italy, September 7-11, 2020},
  pages        = {538--543},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EuroSPW51379.2020.00079},
  doi          = {10.1109/EUROSPW51379.2020.00079},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/SommeseJRDCS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/ToornRFLS20,
  author       = {Olivier van der Toorn and
                  Roland van Rijswijk{-}Deij and
                  Tobias Fiebig and
                  Martina Lindorfer and
                  Anna Sperotto},
  title        = {TXTing 101: Finding Security Issues in the Long Tail of {DNS} {TXT}
                  Records},
  booktitle    = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P
                  Workshops 2020, Genoa, Italy, September 7-11, 2020},
  pages        = {544--549},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EuroSPW51379.2020.00080},
  doi          = {10.1109/EUROSPW51379.2020.00080},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/ToornRFLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/YazdaniTS20,
  author       = {Ramin Yazdani and
                  Olivier van der Toorn and
                  Anna Sperotto},
  title        = {A Case of Identity: Detection of Suspicious {IDN} Homograph Domains
                  Using Active {DNS} Measurements},
  booktitle    = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P
                  Workshops 2020, Genoa, Italy, September 7-11, 2020},
  pages        = {559--564},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EuroSPW51379.2020.00082},
  doi          = {10.1109/EUROSPW51379.2020.00082},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/YazdaniTS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/SommeseBAJRDCS20,
  author       = {Raffaele Sommese and
                  Leandro Marcio Bertholdo and
                  Gautam Akiwate and
                  Mattijs Jonker and
                  Roland van Rijswijk{-}Deij and
                  Alberto Dainotti and
                  kc claffy and
                  Anna Sperotto},
  title        = {MAnycast2: Using Anycast to Measure Anycast},
  booktitle    = {{IMC} '20: {ACM} Internet Measurement Conference, Virtual Event, USA,
                  October 27-29, 2020},
  pages        = {456--463},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3419394.3423646},
  doi          = {10.1145/3419394.3423646},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/SommeseBAJRDCS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/DietzDSP20,
  author       = {Christian Dietz and
                  Gabi Dreo and
                  Anna Sperotto and
                  Aiko Pras},
  title        = {Towards Adversarial Resilience in Proactive Detection of Botnet Domain
                  Names by using {MTD}},
  booktitle    = {{NOMS} 2020 - {IEEE/IFIP} Network Operations and Management Symposium,
                  Budapest, Hungary, April 20-24, 2020},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/NOMS47738.2020.9110332},
  doi          = {10.1109/NOMS47738.2020.9110332},
  timestamp    = {Mon, 15 Jun 2020 11:49:54 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/DietzDSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/JonkerSP20,
  author       = {Mattijs Jonker and
                  Anna Sperotto and
                  Aiko Pras},
  title        = {DDoS Mitigation: {A} Measurement-Based Approach},
  booktitle    = {{NOMS} 2020 - {IEEE/IFIP} Network Operations and Management Symposium,
                  Budapest, Hungary, April 20-24, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/NOMS47738.2020.9110320},
  doi          = {10.1109/NOMS47738.2020.9110320},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/JonkerSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/SteinbergerSBP20,
  author       = {Jessica Steinberger and
                  Anna Sperotto and
                  Harald Baier and
                  Aiko Pras},
  title        = {Distributed DDoS Defense: {A} collaborative Approach at Internet Scale},
  booktitle    = {{NOMS} 2020 - {IEEE/IFIP} Network Operations and Management Symposium,
                  Budapest, Hungary, April 20-24, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/NOMS47738.2020.9110300},
  doi          = {10.1109/NOMS47738.2020.9110300},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/SteinbergerSBP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/SommeseMJRDCS20,
  author       = {Raffaele Sommese and
                  Giovane C. M. Moura and
                  Mattijs Jonker and
                  Roland van Rijswijk{-}Deij and
                  Alberto Dainotti and
                  Kimberly C. Claffy and
                  Anna Sperotto},
  editor       = {Anna Sperotto and
                  Alberto Dainotti and
                  Burkhard Stiller},
  title        = {When Parents and Children Disagree: Diving into {DNS} Delegation Inconsistency},
  booktitle    = {Passive and Active Measurement - 21st International Conference, {PAM}
                  2020, Eugene, Oregon, USA, March 30-31, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12048},
  pages        = {175--189},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-44081-7\_11},
  doi          = {10.1007/978-3-030-44081-7\_11},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pam/SommeseMJRDCS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pam/2020,
  editor       = {Anna Sperotto and
                  Alberto Dainotti and
                  Burkhard Stiller},
  title        = {Passive and Active Measurement - 21st International Conference, {PAM}
                  2020, Eugene, Oregon, USA, March 30-31, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12048},
  publisher    = {Springer},
  year         = {2020},
  note      = {Due to the global outbreak of COVID-19, the {PAM} 2020 conference
                  was organized as a virtual meeting.},
  url          = {https://doi.org/10.1007/978-3-030-44081-7},
  doi          = {10.1007/978-3-030-44081-7},
  isbn         = {978-3-030-44080-0},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/HofstedePSR18,
  author       = {Rick Hofstede and
                  Aiko Pras and
                  Anna Sperotto and
                  Gabi Dreo Rodosek},
  title        = {Flow-Based Compromise Detection: Lessons Learned},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {1},
  pages        = {82--89},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1331021},
  doi          = {10.1109/MSP.2018.1331021},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/HofstedePSR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aims/ToornS18,
  author       = {Olivier van der Toorn and
                  Anna Sperotto},
  editor       = {Burkhard Stiller},
  title        = {Threat Identification Using Active {DNS} Measurements},
  booktitle    = {12th International Conference on Autonomous Infrastructure, Management
                  and Security, {AIMS} 2018, Munich, Germany, June 4-5, 2018, Proceedings},
  pages        = {1--5},
  publisher    = {{IFIP}},
  year         = {2018},
  url          = {http://www.aims-conference.org/2018/AIMS-2018-Proceedings.pdf\#page=9},
  timestamp    = {Thu, 12 Mar 2020 11:30:46 +0100},
  biburl       = {https://dblp.org/rec/conf/aims/ToornS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/JonkerPDS18,
  author       = {Mattijs Jonker and
                  Aiko Pras and
                  Alberto Dainotti and
                  Anna Sperotto},
  title        = {A First Joint Look at DoS Attacks and {BGP} Blackholing in the Wild},
  booktitle    = {Proceedings of the Internet Measurement Conference 2018, {IMC} 2018,
                  Boston, MA, USA, October 31 - November 02, 2018},
  pages        = {457--463},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://dl.acm.org/citation.cfm?id=3278571},
  timestamp    = {Fri, 25 Oct 2019 09:51:49 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/JonkerPDS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nof/DietzCSWASP18,
  author       = {Christian Dietz and
                  Raphael Labaca Castro and
                  Jessica Steinberger and
                  Cezary Wilczak and
                  Marcel Antzek and
                  Anna Sperotto and
                  Aiko Pras},
  editor       = {Filip Idzikowski and
                  Prosper Chemouil and
                  Adrian Kliks and
                  Daphn{\'{e}} Tuncer and
                  Marcin Rodziewicz},
  title        = {IoT-Botnet Detection and Isolation by Access Routers},
  booktitle    = {9th International Conference on the Network of the Future, {NOF} 2018,
                  Poznan, Poland, November 19-21, 2018},
  pages        = {88--95},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/NOF.2018.8598138},
  doi          = {10.1109/NOF.2018.8598138},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/nof/DietzCSWASP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/SteinbergerKDBS18,
  author       = {Jessica Steinberger and
                  Benjamin Kuhnert and
                  Christian Dietz and
                  Lisa Ball and
                  Anna Sperotto and
                  Harald Baier and
                  Aiko Pras and
                  Gabi Dreo},
  title        = {DDoS defense using {MTD} and {SDN}},
  booktitle    = {2018 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS}
                  2018, Taipei, Taiwan, April 23-27, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/NOMS.2018.8406221},
  doi          = {10.1109/NOMS.2018.8406221},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/SteinbergerKDBS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/ToornRGS18,
  author       = {Olivier van der Toorn and
                  Roland van Rijswijk{-}Deij and
                  Bart Geesink and
                  Anna Sperotto},
  title        = {Melting the snow: Using active {DNS} measurements to detect snowshoe
                  spam domains},
  booktitle    = {2018 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS}
                  2018, Taipei, Taiwan, April 23-27, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/NOMS.2018.8406222},
  doi          = {10.1109/NOMS.2018.8406222},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/ToornRGS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/SantannaSTSGP17,
  author       = {Jos{\'{e}} Jair Santanna and
                  Ricardo de Oliveira Schmidt and
                  Daphn{\'{e}} Tuncer and
                  Anna Sperotto and
                  Lisandro Zambenedetti Granville and
                  Aiko Pras},
  title        = {Quiet Dogs Can Bite: Which Booters Should We Go After, and What Are
                  Our Mitigation Options?},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {55},
  number       = {7},
  pages        = {50--56},
  year         = {2017},
  url          = {https://doi.org/10.1109/MCOM.2017.1600992},
  doi          = {10.1109/MCOM.2017.1600992},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/SantannaSTSGP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/HofstedeJSP17,
  author       = {Rick Hofstede and
                  Mattijs Jonker and
                  Anna Sperotto and
                  Aiko Pras},
  title        = {Flow-Based Web Application Brute-Force Attack and Compromise Detection},
  journal      = {J. Netw. Syst. Manag.},
  volume       = {25},
  number       = {4},
  pages        = {735--758},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10922-017-9421-4},
  doi          = {10.1007/S10922-017-9421-4},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnsm/HofstedeJSP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/Rijswijk-DeijHS17,
  author       = {Roland van Rijswijk{-}Deij and
                  Kaspar Hageman and
                  Anna Sperotto and
                  Aiko Pras},
  title        = {The Performance Impact of Elliptic Curve Cryptography on {DNSSEC}
                  Validation},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {25},
  number       = {2},
  pages        = {738--750},
  year         = {2017},
  url          = {https://doi.org/10.1109/TNET.2016.2605767},
  doi          = {10.1109/TNET.2016.2605767},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ton/Rijswijk-DeijHS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsm/JonkerS17,
  author       = {Mattijs Jonker and
                  Anna Sperotto},
  title        = {Measuring exposure in DDoS protection services},
  booktitle    = {13th International Conference on Network and Service Management, {CNSM}
                  2017, Tokyo, Japan, November 26-30, 2017},
  pages        = {1--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.23919/CNSM.2017.8255991},
  doi          = {10.23919/CNSM.2017.8255991},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsm/JonkerS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/JonkerKKRSD17,
  author       = {Mattijs Jonker and
                  Alistair King and
                  Johannes Krupp and
                  Christian Rossow and
                  Anna Sperotto and
                  Alberto Dainotti},
  editor       = {Steve Uhlig and
                  Olaf Maennel},
  title        = {Millions of targets under attack: a macroscopic characterization of
                  the DoS ecosystem},
  booktitle    = {Proceedings of the 2017 Internet Measurement Conference, {IMC} 2017,
                  London, United Kingdom, November 1-3, 2017},
  pages        = {100--113},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3131365.3131383},
  doi          = {10.1145/3131365.3131383},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/JonkerKKRSD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/BajpaiKOSST17,
  author       = {Vaibhav Bajpai and
                  Mirja K{\"{u}}hlewind and
                  J{\"{o}}rg Ott and
                  J{\"{u}}rgen Sch{\"{o}}nw{\"{a}}lder and
                  Anna Sperotto and
                  Brian Trammell},
  title        = {Challenges with Reproducibility},
  booktitle    = {Proceedings of the Reproducibility Workshop, Reproducibility@SIGCOMM
                  2017, Los Angeles, CA, USA, August 25, 2017},
  pages        = {1--4},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3097766.3097767},
  doi          = {10.1145/3097766.3097767},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/BajpaiKOSST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/SperottoTR17,
  author       = {Anna Sperotto and
                  Olivier van der Toorn and
                  Roland van Rijswijk{-}Deij},
  editor       = {Jeff Burke and
                  Matthias W{\"{a}}hlisch and
                  Nicholas Zhang and
                  David Meyer and
                  Puneet Sharma},
  title        = {{TIDE:} Threat Identification Using Active {DNS} Measurements},
  booktitle    = {Posters and Demos Proceedings of the Conference of the {ACM} Special
                  Interest Group on Data Communication, {SIGCOMM} 2017, Los Angeles,
                  CA, USA, August 21-25, 2017},
  pages        = {65--67},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3123878.3131988},
  doi          = {10.1145/3123878.3131988},
  timestamp    = {Mon, 29 Nov 2021 07:58:21 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/SperottoTR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/Rijswijk-DeijJS16,
  author       = {Roland van Rijswijk{-}Deij and
                  Mattijs Jonker and
                  Anna Sperotto and
                  Aiko Pras},
  title        = {A High-Performance, Scalable Infrastructure for Large-Scale Active
                  {DNS} Measurements},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {34},
  number       = {6},
  pages        = {1877--1888},
  year         = {2016},
  url          = {https://doi.org/10.1109/JSAC.2016.2558918},
  doi          = {10.1109/JSAC.2016.2558918},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsac/Rijswijk-DeijJS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aims/SteinbergerKSBP16,
  author       = {Jessica Steinberger and
                  Benjamin Kuhnert and
                  Anna Sperotto and
                  Harald Baier and
                  Aiko Pras},
  editor       = {R{\'{e}}mi Badonnel and
                  Robert Koch and
                  Aiko Pras and
                  Martin Drasar and
                  Burkhard Stiller},
  title        = {In Whom Do We Trust - Sharing Security Events},
  booktitle    = {Management and Security in the Age of Hyperconnectivity - 10th {IFIP}
                  {WG} 6.6 International Conference on Autonomous Infrastructure, Management,
                  and Security, {AIMS} 2016, Munich, Germany, June 20-23, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9701},
  pages        = {111--124},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39814-3\_11},
  doi          = {10.1007/978-3-319-39814-3\_11},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/aims/SteinbergerKSBP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aims/DietzSDP16,
  author       = {Christian Dietz and
                  Anna Sperotto and
                  Gabi Dreo and
                  Aiko Pras},
  editor       = {R{\'{e}}mi Badonnel and
                  Robert Koch and
                  Aiko Pras and
                  Martin Drasar and
                  Burkhard Stiller},
  title        = {How to Achieve Early Botnet Detection at the Provider Level?},
  booktitle    = {Management and Security in the Age of Hyperconnectivity - 10th {IFIP}
                  {WG} 6.6 International Conference on Autonomous Infrastructure, Management,
                  and Security, {AIMS} 2016, Munich, Germany, June 20-23, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9701},
  pages        = {142--146},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39814-3\_15},
  doi          = {10.1007/978-3-319-39814-3\_15},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aims/DietzSDP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsm/Rijswijk-DeijJS16,
  author       = {Roland van Rijswijk{-}Deij and
                  Mattijs Jonker and
                  Anna Sperotto},
  title        = {On the adoption of the elliptic curve digital signature algorithm
                  {(ECDSA)} in {DNSSEC}},
  booktitle    = {12th International Conference on Network and Service Management, {CNSM}
                  2016, Montreal, QC, Canada, October 31 - Nov. 4, 2016},
  pages        = {258--262},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNSM.2016.7818428},
  doi          = {10.1109/CNSM.2016.7818428},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnsm/Rijswijk-DeijJS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/JonkerSRSP16,
  author       = {Mattijs Jonker and
                  Anna Sperotto and
                  Roland van Rijswijk{-}Deij and
                  Ramin Sadre and
                  Aiko Pras},
  editor       = {Phillipa Gill and
                  John S. Heidemann and
                  John W. Byers and
                  Ramesh Govindan},
  title        = {Measuring the Adoption of DDoS Protection Services},
  booktitle    = {Proceedings of the 2016 {ACM} on Internet Measurement Conference,
                  {IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016},
  pages        = {279--285},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2987487},
  timestamp    = {Tue, 06 Nov 2018 11:07:19 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/JonkerSRSP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmb/PrasSSS16,
  author       = {Aiko Pras and
                  Jos{\'{e}} Jair Santanna and
                  Jessica Steinberger and
                  Anna Sperotto},
  editor       = {Anne Remke and
                  Boudewijn R. Haverkort},
  title        = {DDoS 3.0 - How Terrorists Bring Down the Internet},
  booktitle    = {Measurement, Modelling and Evaluation of Dependable Computer and Communication
                  Systems - 18th International {GI/ITG} Conference, {MMB} {\&} {DFT}
                  2016, M{\"{u}}nster, Germany, April 4-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9629},
  pages        = {1--4},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-31559-1\_1},
  doi          = {10.1007/978-3-319-31559-1\_1},
  timestamp    = {Sat, 19 Oct 2019 20:11:41 +0200},
  biburl       = {https://dblp.org/rec/conf/mmb/PrasSSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/SteinbergerKSBP16,
  author       = {Jessica Steinberger and
                  Benjamin Kuhnert and
                  Anna Sperotto and
                  Harald Baier and
                  Aiko Pras},
  editor       = {Sema Oktug and
                  Mehmet Ulema and
                  Cicek Cavdar and
                  Lisandro Zambenedetti Granville and
                  Carlos Raniery Paula dos Santos},
  title        = {Collaborative DDoS defense using flow-based security event information},
  booktitle    = {2016 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS}
                  2016, Istanbul, Turkey, April 25-29, 2016},
  pages        = {516--522},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NOMS.2016.7502852},
  doi          = {10.1109/NOMS.2016.7502852},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/SteinbergerKSBP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/Rijswijk-DeijSP15,
  author       = {Roland van Rijswijk{-}Deij and
                  Anna Sperotto and
                  Aiko Pras},
  title        = {Making the Case for Elliptic Curves in {DNSSEC}},
  journal      = {Comput. Commun. Rev.},
  volume       = {45},
  number       = {5},
  pages        = {13--19},
  year         = {2015},
  url          = {https://doi.org/10.1145/2831347.2831350},
  doi          = {10.1145/2831347.2831350},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ccr/Rijswijk-DeijSP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SperottoHDSR15,
  author       = {Anna Sperotto and
                  Rick Hofstede and
                  Alberto Dainotti and
                  Corinna Schmitt and
                  Gabi Dreo Rodosek},
  title        = {Special issue on measure, detect and mitigate-challenges and trends
                  in network security},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {5},
  pages        = {261--262},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1905},
  doi          = {10.1002/NEM.1905},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/SperottoHDSR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/DragoHSSP15,
  author       = {Idilio Drago and
                  Rick Hofstede and
                  Ramin Sadre and
                  Anna Sperotto and
                  Aiko Pras},
  title        = {Measuring Cloud Service Health Using NetFlow/IPFIX: The WikiLeaks
                  Case},
  journal      = {J. Netw. Syst. Manag.},
  volume       = {23},
  number       = {1},
  pages        = {58--88},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10922-013-9278-0},
  doi          = {10.1007/S10922-013-9278-0},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnsm/DragoHSSP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/SperottoDLCFVC15,
  author       = {Anna Sperotto and
                  Guillaume Doyen and
                  Steven Latr{\'{e}} and
                  Marinos Charalambides and
                  Jeroen Famaey and
                  Petr Velan and
                  Pavel Celeda},
  title        = {Report on the 8th International Conference on Autonomous Infrastructure,
                  Management, and Security {(AIMS} 2014) - Monitoring and Securing Virtualized
                  Networks and Services},
  journal      = {J. Netw. Syst. Manag.},
  volume       = {23},
  number       = {3},
  pages        = {794--802},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10922-015-9346-8},
  doi          = {10.1007/S10922-015-9346-8},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnsm/SperottoDLCFVC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/SchmidtSSBP15,
  author       = {Ricardo de Oliveira Schmidt and
                  Ramin Sadre and
                  Anna Sperotto and
                  Hans van den Berg and
                  Aiko Pras},
  title        = {Impact of Packet Sampling on Link Dimensioning},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {12},
  number       = {3},
  pages        = {392--405},
  year         = {2015},
  url          = {https://doi.org/10.1109/TNSM.2015.2436365},
  doi          = {10.1109/TNSM.2015.2436365},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/SchmidtSSBP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aims/VriesSSP15,
  author       = {Wouter Willem de Vries and
                  Jos{\'{e}} Jair Santanna and
                  Anna Sperotto and
                  Aiko Pras},
  editor       = {Steven Latr{\'{e}} and
                  Marinos Charalambides and
                  J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and
                  Corinna Schmitt and
                  Burkhard Stiller},
  title        = {How Asymmetric Is the Internet? - {A} Study to Support the Use of
                  Traceroute},
  booktitle    = {Intelligent Mechanisms for Network Configuration and Security - 9th
                  {IFIP} {WG} 6.6 International Conference on Autonomous Infrastructure,
                  Management, and Security, {AIMS} 2015, Ghent, Belgium, June 22-25,
                  2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9122},
  pages        = {113--125},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-20034-7\_12},
  doi          = {10.1007/978-3-319-20034-7\_12},
  timestamp    = {Mon, 01 May 2023 13:01:37 +0200},
  biburl       = {https://dblp.org/rec/conf/aims/VriesSSP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aims/JonkerS15,
  author       = {Mattijs Jonker and
                  Anna Sperotto},
  editor       = {Steven Latr{\'{e}} and
                  Marinos Charalambides and
                  J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and
                  Corinna Schmitt and
                  Burkhard Stiller},
  title        = {Mitigating DDoS Attacks Using OpenFlow-Based Software Defined Networking},
  booktitle    = {Intelligent Mechanisms for Network Configuration and Security - 9th
                  {IFIP} {WG} 6.6 International Conference on Autonomous Infrastructure,
                  Management, and Security, {AIMS} 2015, Ghent, Belgium, June 22-25,
                  2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9122},
  pages        = {129--133},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-20034-7\_13},
  doi          = {10.1007/978-3-319-20034-7\_13},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aims/JonkerS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aims/HendriksSP15,
  author       = {Luuk Hendriks and
                  Anna Sperotto and
                  Aiko Pras},
  editor       = {Steven Latr{\'{e}} and
                  Marinos Charalambides and
                  J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and
                  Corinna Schmitt and
                  Burkhard Stiller},
  title        = {Characterizing the IPv6 Security Landscape by Large-Scale Measurements},
  booktitle    = {Intelligent Mechanisms for Network Configuration and Security - 9th
                  {IFIP} {WG} 6.6 International Conference on Autonomous Infrastructure,
                  Management, and Security, {AIMS} 2015, Ghent, Belgium, June 22-25,
                  2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9122},
  pages        = {145--149},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-20034-7\_16},
  doi          = {10.1007/978-3-319-20034-7\_16},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aims/HendriksSP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/SantannaRHSWGP15,
  author       = {Jos{\'{e}} Jair Santanna and
                  Roland van Rijswijk{-}Deij and
                  Rick Hofstede and
                  Anna Sperotto and
                  Mark Wierbosch and
                  Lisandro Zambenedetti Granville and
                  Aiko Pras},
  editor       = {Remi Badonnel and
                  Jin Xiao and
                  Shingo Ata and
                  Filip De Turck and
                  Voicu Groza and
                  Carlos Raniery Paula dos Santos},
  title        = {Booters - An analysis of DDoS-as-a-service attacks},
  booktitle    = {{IFIP/IEEE} International Symposium on Integrated Network Management,
                  {IM} 2015, Ottawa, ON, Canada, 11-15 May, 2015},
  pages        = {243--251},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INM.2015.7140298},
  doi          = {10.1109/INM.2015.7140298},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/im/SantannaRHSWGP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/SteinbergerSGB15,
  author       = {Jessica Steinberger and
                  Anna Sperotto and
                  Mario Golling and
                  Harald Baier},
  editor       = {Remi Badonnel and
                  Jin Xiao and
                  Shingo Ata and
                  Filip De Turck and
                  Voicu Groza and
                  Carlos Raniery Paula dos Santos},
  title        = {How to exchange security events? Overview and evaluation of formats
                  and protocols},
  booktitle    = {{IFIP/IEEE} International Symposium on Integrated Network Management,
                  {IM} 2015, Ottawa, ON, Canada, 11-15 May, 2015},
  pages        = {261--269},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INM.2015.7140300},
  doi          = {10.1109/INM.2015.7140300},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/im/SteinbergerSGB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/JonkerHSP15,
  author       = {Mattijs Jonker and
                  Rick Hofstede and
                  Anna Sperotto and
                  Aiko Pras},
  editor       = {Remi Badonnel and
                  Jin Xiao and
                  Shingo Ata and
                  Filip De Turck and
                  Voicu Groza and
                  Carlos Raniery Paula dos Santos},
  title        = {Unveiling flat traffic on the Internet: An {SSH} attack case study},
  booktitle    = {{IFIP/IEEE} International Symposium on Integrated Network Management,
                  {IM} 2015, Ottawa, ON, Canada, 11-15 May, 2015},
  pages        = {270--278},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INM.2015.7140301},
  doi          = {10.1109/INM.2015.7140301},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/im/JonkerHSP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/SantannaDSP15,
  author       = {Jos{\'{e}} Jair Santanna and
                  Romain Durban and
                  Anna Sperotto and
                  Aiko Pras},
  editor       = {Remi Badonnel and
                  Jin Xiao and
                  Shingo Ata and
                  Filip De Turck and
                  Voicu Groza and
                  Carlos Raniery Paula dos Santos},
  title        = {Inside booters: An analysis on operational databases},
  booktitle    = {{IFIP/IEEE} International Symposium on Integrated Network Management,
                  {IM} 2015, Ottawa, ON, Canada, 11-15 May, 2015},
  pages        = {432--440},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INM.2015.7140320},
  doi          = {10.1109/INM.2015.7140320},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/im/SantannaDSP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/ToornHJS15,
  author       = {Olivier van der Toorn and
                  Rick Hofstede and
                  Mattijs Jonker and
                  Anna Sperotto},
  editor       = {Remi Badonnel and
                  Jin Xiao and
                  Shingo Ata and
                  Filip De Turck and
                  Voicu Groza and
                  Carlos Raniery Paula dos Santos},
  title        = {A first look at {HTTP(S)} intrusion detection using NetFlow/IPFIX},
  booktitle    = {{IFIP/IEEE} International Symposium on Integrated Network Management,
                  {IM} 2015, Ottawa, ON, Canada, 11-15 May, 2015},
  pages        = {862--865},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INM.2015.7140395},
  doi          = {10.1109/INM.2015.7140395},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/im/ToornHJS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/SteinbergerSBP15,
  author       = {Jessica Steinberger and
                  Anna Sperotto and
                  Harald Baier and
                  Aiko Pras},
  editor       = {Remi Badonnel and
                  Jin Xiao and
                  Shingo Ata and
                  Filip De Turck and
                  Voicu Groza and
                  Carlos Raniery Paula dos Santos},
  title        = {Collaborative attack mitigation and response: {A} survey},
  booktitle    = {{IFIP/IEEE} International Symposium on Integrated Network Management,
                  {IM} 2015, Ottawa, ON, Canada, 11-15 May, 2015},
  pages        = {910--913},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INM.2015.7140407},
  doi          = {10.1109/INM.2015.7140407},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/im/SteinbergerSBP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/SteegHSP15,
  author       = {Daniel van der Steeg and
                  Rick Hofstede and
                  Anna Sperotto and
                  Aiko Pras},
  editor       = {Remi Badonnel and
                  Jin Xiao and
                  Shingo Ata and
                  Filip De Turck and
                  Voicu Groza and
                  Carlos Raniery Paula dos Santos},
  title        = {Real-time DDoS attack detection for Cisco {IOS} using NetFlow},
  booktitle    = {{IFIP/IEEE} International Symposium on Integrated Network Management,
                  {IM} 2015, Ottawa, ON, Canada, 11-15 May, 2015},
  pages        = {972--977},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INM.2015.7140420},
  doi          = {10.1109/INM.2015.7140420},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/im/SteegHSP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/Rijswijk-DeijJS15,
  author       = {Roland van Rijswijk{-}Deij and
                  Mattijs Jonker and
                  Anna Sperotto and
                  Aiko Pras},
  editor       = {Steve Uhlig and
                  Olaf Maennel and
                  Brad Karp and
                  Jitendra Padhye},
  title        = {The Internet of Names: {A} {DNS} Big Dataset},
  booktitle    = {Proceedings of the 2015 {ACM} Conference on Special Interest Group
                  on Data Communication, {SIGCOMM} 2015, London, United Kingdom, August
                  17-21, 2015},
  pages        = {91--92},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2785956.2789996},
  doi          = {10.1145/2785956.2789996},
  timestamp    = {Wed, 21 Jul 2021 16:09:54 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/Rijswijk-DeijJS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/HofstedeHSP14,
  author       = {Rick Hofstede and
                  Luuk Hendriks and
                  Anna Sperotto and
                  Aiko Pras},
  title        = {{SSH} Compromise Detection using NetFlow/IPFIX},
  journal      = {Comput. Commun. Rev.},
  volume       = {44},
  number       = {5},
  pages        = {20--26},
  year         = {2014},
  url          = {https://doi.org/10.1145/2677046.2677050},
  doi          = {10.1145/2677046.2677050},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/HofstedeHSP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/SchmidtSSBP14,
  author       = {Ricardo de Oliveira Schmidt and
                  Ramin Sadre and
                  Anna Sperotto and
                  Hans van den Berg and
                  Aiko Pras},
  title        = {A hybrid procedure for efficient link dimensioning},
  journal      = {Comput. Networks},
  volume       = {67},
  pages        = {252--269},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.comnet.2014.04.008},
  doi          = {10.1016/J.COMNET.2014.04.008},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/SchmidtSSBP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/HofstedeCTDSSP14,
  author       = {Rick Hofstede and
                  Pavel Celeda and
                  Brian Trammell and
                  Idilio Drago and
                  Ramin Sadre and
                  Anna Sperotto and
                  Aiko Pras},
  title        = {Flow Monitoring Explained: From Packet Capture to Data Analysis With
                  NetFlow and {IPFIX}},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {16},
  number       = {4},
  pages        = {2037--2064},
  year         = {2014},
  url          = {https://doi.org/10.1109/COMST.2014.2321898},
  doi          = {10.1109/COMST.2014.2321898},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/HofstedeCTDSSP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SadreSHB14,
  author       = {Ramin Sadre and
                  Anna Sperotto and
                  Rick Hofstede and
                  Nevil Brownlee},
  title        = {Flow-based Approaches in Network Management: Recent Advances and Future
                  Trends},
  journal      = {Int. J. Netw. Manag.},
  volume       = {24},
  number       = {4},
  pages        = {219--220},
  year         = {2014},
  url          = {https://doi.org/10.1002/nem.1872},
  doi          = {10.1002/NEM.1872},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SadreSHB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/DoyenWSCGSS14,
  author       = {Guillaume Doyen and
                  Martin Waldburger and
                  Anna Sperotto and
                  Pavel Celeda and
                  Juan{-}Luis Gorricho and
                  Thomas Schaaf and
                  Joan Serrat},
  title        = {Report on the 7th International Conference on Autonomous Infrastructure,
                  Management, and Security {(AIMS} 2013): Emerging Management Mechanisms
                  for the Future Internet},
  journal      = {J. Netw. Syst. Manag.},
  volume       = {22},
  number       = {2},
  pages        = {289--296},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10922-013-9298-9},
  doi          = {10.1007/S10922-013-9298-9},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnsm/DoyenWSCGSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aims/SantannaS14,
  author       = {Jos{\'{e}} Jair Santanna and
                  Anna Sperotto},
  editor       = {Anna Sperotto and
                  Guillaume Doyen and
                  Steven Latr{\'{e}} and
                  Marinos Charalambides and
                  Burkhard Stiller},
  title        = {Characterizing and Mitigating the DDoS-as-a-Service Phenomenon},
  booktitle    = {Monitoring and Securing Virtualized Networks and Services - 8th {IFIP}
                  {WG} 6.6 International Conference on Autonomous Infrastructure, Management,
                  and Security, {AIMS} 2014, Brno, Czech Republic, June 30 - July 3,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8508},
  pages        = {74--78},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43862-6\_10},
  doi          = {10.1007/978-3-662-43862-6\_10},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/aims/SantannaS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aims/KerkersSS14,
  author       = {Max Kerkers and
                  Jos{\'{e}} Jair Santanna and
                  Anna Sperotto},
  editor       = {Anna Sperotto and
                  Guillaume Doyen and
                  Steven Latr{\'{e}} and
                  Marinos Charalambides and
                  Burkhard Stiller},
  title        = {Characterisation of the Kelihos.B Botnet},
  booktitle    = {Monitoring and Securing Virtualized Networks and Services - 8th {IFIP}
                  {WG} 6.6 International Conference on Autonomous Infrastructure, Management,
                  and Security, {AIMS} 2014, Brno, Czech Republic, June 30 - July 3,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8508},
  pages        = {79--91},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43862-6\_11},
  doi          = {10.1007/978-3-662-43862-6\_11},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aims/KerkersSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aims/KarimzadehSP14,
  author       = {Morteza Karimzadeh and
                  Anna Sperotto and
                  Aiko Pras},
  editor       = {Anna Sperotto and
                  Guillaume Doyen and
                  Steven Latr{\'{e}} and
                  Marinos Charalambides and
                  Burkhard Stiller},
  title        = {Software Defined Networking to Improve Mobility Management Performance},
  booktitle    = {Monitoring and Securing Virtualized Networks and Services - 8th {IFIP}
                  {WG} 6.6 International Conference on Autonomous Infrastructure, Management,
                  and Security, {AIMS} 2014, Brno, Czech Republic, June 30 - July 3,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8508},
  pages        = {118--122},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43862-6\_14},
  doi          = {10.1007/978-3-662-43862-6\_14},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aims/KarimzadehSP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip6-6/MaanSSB14,
  author       = {Dirk Maan and
                  Jos{\'{e}} Jair Santanna and
                  Anna Sperotto and
                  Pieter{-}Tjerk de Boer},
  editor       = {Yvon Kermarrec},
  title        = {Towards Validation of the Internet Census 2012},
  booktitle    = {Advances in Communication Networking - 20th {EUNICE/IFIP} {EG} 6.2,
                  6.6 International Workshop, Rennes, France, September 1-5, 2014, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8846},
  pages        = {85--96},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13488-8\_9},
  doi          = {10.1007/978-3-319-13488-8\_9},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip6-6/MaanSSB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/Rijswijk-DeijSP14,
  author       = {Roland van Rijswijk{-}Deij and
                  Anna Sperotto and
                  Aiko Pras},
  editor       = {Carey Williamson and
                  Aditya Akella and
                  Nina Taft},
  title        = {{DNSSEC} and its potential for DDoS attacks: a comprehensive measurement
                  study},
  booktitle    = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014,
                  Vancouver, BC, Canada, November 5-7, 2014},
  pages        = {449--460},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2663716.2663731},
  doi          = {10.1145/2663716.2663731},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/Rijswijk-DeijSP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DietrichHPRSSWZ14,
  author       = {Sven Dietrich and
                  Jeroen van der Ham and
                  Aiko Pras and
                  Roland van Rijswijk{-}Deij and
                  Darren Shou and
                  Anna Sperotto and
                  Aimee van Wynsberghe and
                  Lenore D. Zuck},
  title        = {Ethics in Data Sharing: Developing a Model for Best Practice},
  booktitle    = {35. {IEEE} Security and Privacy Workshops, {SPW} 2014, San Jose, CA,
                  USA, May 17-18, 2014},
  pages        = {5--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SPW.2014.43},
  doi          = {10.1109/SPW.2014.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/DietrichHPRSSWZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/aims/2014,
  editor       = {Anna Sperotto and
                  Guillaume Doyen and
                  Steven Latr{\'{e}} and
                  Marinos Charalambides and
                  Burkhard Stiller},
  title        = {Monitoring and Securing Virtualized Networks and Services - 8th {IFIP}
                  {WG} 6.6 International Conference on Autonomous Infrastructure, Management,
                  and Security, {AIMS} 2014, Brno, Czech Republic, June 30 - July 3,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8508},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43862-6},
  doi          = {10.1007/978-3-662-43862-6},
  isbn         = {978-3-662-43861-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aims/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pik/DragoSHSKHP13,
  author       = {Idilio Drago and
                  Ricardo de Oliveira Schmidt and
                  Rick Hofstede and
                  Anna Sperotto and
                  Morteza Karimzadeh and
                  Boudewijn R. Haverkort and
                  Aiko Pras},
  title        = {Networking for the Cloud: Challenges and Trends},
  journal      = {Prax. Inf.verarb. Kommun.},
  volume       = {36},
  number       = {4},
  pages        = {207--214},
  year         = {2013},
  url          = {https://doi.org/10.1515/pik-2013-0035},
  doi          = {10.1515/PIK-2013-0035},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pik/DragoSHSKHP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aims/EllensZSSMM13,
  author       = {Wendy Ellens and
                  Piotr Zuraniewski and
                  Anna Sperotto and
                  Harm Schotanus and
                  Michel Mandjes and
                  Erik Meeuwissen},
  editor       = {Guillaume Doyen and
                  Martin Waldburger and
                  Pavel Celeda and
                  Anna Sperotto and
                  Burkhard Stiller},
  title        = {Flow-Based Detection of {DNS} Tunnels},
  booktitle    = {Emerging Management Mechanisms for the Future Internet - 7th {IFIP}
                  {WG} 6.6 International Conference on Autonomous Infrastructure, Management,
                  and Security, {AIMS} 2013, Barcelona, Spain, June 25-28, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7943},
  pages        = {124--135},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38998-6\_16},
  doi          = {10.1007/978-3-642-38998-6\_16},
  timestamp    = {Fri, 27 Dec 2019 21:20:05 +0100},
  biburl       = {https://dblp.org/rec/conf/aims/EllensZSSMM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsm/SchmidtSSP13,
  author       = {Ricardo de Oliveira Schmidt and
                  Ramin Sadre and
                  Anna Sperotto and
                  Aiko Pras},
  title        = {Lightweight link dimensioning using sFlow sampling},
  booktitle    = {Proceedings of the 9th International Conference on Network and Service
                  Management, {CNSM} 2013, Zurich, Switzerland, October 14-18, 2013},
  pages        = {152--155},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNSM.2013.6727827},
  doi          = {10.1109/CNSM.2013.6727827},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnsm/SchmidtSSP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsm/HofstedeBSP13,
  author       = {Rick Hofstede and
                  V{\'{a}}clav Bartos and
                  Anna Sperotto and
                  Aiko Pras},
  title        = {Towards real-time intrusion detection for NetFlow and {IPFIX}},
  booktitle    = {Proceedings of the 9th International Conference on Network and Service
                  Management, {CNSM} 2013, Zurich, Switzerland, October 14-18, 2013},
  pages        = {227--234},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNSM.2013.6727841},
  doi          = {10.1109/CNSM.2013.6727841},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnsm/HofstedeBSP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/MouraSSP13,
  author       = {Giovane Cesar Moreira Moura and
                  Anna Sperotto and
                  Ramin Sadre and
                  Aiko Pras},
  editor       = {Filip De Turck and
                  Yixin Diao and
                  Choong Seon Hong and
                  Deep Medhi and
                  Ramin Sadre},
  title        = {Evaluating third-party Bad Neighborhood blacklists for Spam detection},
  booktitle    = {2013 {IFIP/IEEE} International Symposium on Integrated Network Management
                  {(IM} 2013), Ghent, Belgium, May 27-31, 2013},
  pages        = {252--259},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/6572993/},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/im/MouraSSP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/HofstedeDSSP13,
  author       = {Rick Hofstede and
                  Idilio Drago and
                  Anna Sperotto and
                  Ramin Sadre and
                  Aiko Pras},
  editor       = {Matthew Roughan and
                  Rocky K. C. Chang},
  title        = {Measurement Artifacts in NetFlow Data},
  booktitle    = {Passive and Active Measurement - 14th International Conference, {PAM}
                  2013, Hong Kong, China, March 18-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7799},
  pages        = {1--10},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36516-4\_1},
  doi          = {10.1007/978-3-642-36516-4\_1},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/HofstedeDSSP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/aims/2013,
  editor       = {Guillaume Doyen and
                  Martin Waldburger and
                  Pavel Celeda and
                  Anna Sperotto and
                  Burkhard Stiller},
  title        = {Emerging Management Mechanisms for the Future Internet - 7th {IFIP}
                  {WG} 6.6 International Conference on Autonomous Infrastructure, Management,
                  and Security, {AIMS} 2013, Barcelona, Spain, June 25-28, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7943},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38998-6},
  doi          = {10.1007/978-3-642-38998-6},
  isbn         = {978-3-642-38997-9},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aims/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/SperottoMSBP12,
  author       = {Anna Sperotto and
                  Michel Mandjes and
                  Ramin Sadre and
                  Pieter{-}Tjerk de Boer and
                  Aiko Pras},
  title        = {Autonomic Parameter Tuning of Anomaly-Based IDSs: an {SSH} Case Study},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {9},
  number       = {2},
  pages        = {128--141},
  year         = {2012},
  url          = {https://doi.org/10.1109/TNSM.2012.031512.110146},
  doi          = {10.1109/TNSM.2012.031512.110146},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/SperottoMSBP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aims/HellemonsHHSSP12,
  author       = {Laurens Hellemons and
                  Luuk Hendriks and
                  Rick Hofstede and
                  Anna Sperotto and
                  Ramin Sadre and
                  Aiko Pras},
  editor       = {Ramin Sadre and
                  Jiri Novotn{\'{y}} and
                  Pavel Celeda and
                  Martin Waldburger and
                  Burkhard Stiller},
  title        = {SSHCure: {A} Flow-Based {SSH} Intrusion Detection System},
  booktitle    = {Dependable Networks and Services - 6th {IFIP} {WG} 6.6 International
                  Conference on Autonomous Infrastructure, Management, and Security,
                  {AIMS} 2012, Luxembourg, Luxembourg, June 4-8, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7279},
  pages        = {86--97},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30633-4\_11},
  doi          = {10.1007/978-3-642-30633-4\_11},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/aims/HellemonsHHSSP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aims/SchmidtSSP12,
  author       = {Ricardo de Oliveira Schmidt and
                  Anna Sperotto and
                  Ramin Sadre and
                  Aiko Pras},
  editor       = {Ramin Sadre and
                  Jiri Novotn{\'{y}} and
                  Pavel Celeda and
                  Martin Waldburger and
                  Burkhard Stiller},
  title        = {Towards Bandwidth Estimation Using Flow-Level Measurements},
  booktitle    = {Dependable Networks and Services - 6th {IFIP} {WG} 6.6 International
                  Conference on Autonomous Infrastructure, Management, and Security,
                  {AIMS} 2012, Luxembourg, Luxembourg, June 4-8, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7279},
  pages        = {127--138},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30633-4\_18},
  doi          = {10.1007/978-3-642-30633-4\_18},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aims/SchmidtSSP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/DragoMMSSP12,
  author       = {Idilio Drago and
                  Marco Mellia and
                  Maurizio M. Munaf{\`{o}} and
                  Anna Sperotto and
                  Ramin Sadre and
                  Aiko Pras},
  editor       = {John W. Byers and
                  Jim Kurose and
                  Ratul Mahajan and
                  Alex C. Snoeren},
  title        = {Inside dropbox: understanding personal cloud storage services},
  booktitle    = {Proceedings of the 12th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} '12, Boston, MA, USA, November 14-16, 2012},
  pages        = {481--494},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2398776.2398827},
  doi          = {10.1145/2398776.2398827},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/DragoMMSSP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/SadreSP12,
  author       = {Ramin Sadre and
                  Anna Sperotto and
                  Aiko Pras},
  editor       = {Filip De Turck and
                  Luciano Paschoal Gaspary and
                  Deep Medhi},
  title        = {The effects of DDoS attacks on flow monitoring applications},
  booktitle    = {2012 {IEEE} Network Operations and Management Symposium, {NOMS} 2012,
                  Maui, HI, USA, April 16-20, 2012},
  pages        = {269--277},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/NOMS.2012.6211908},
  doi          = {10.1109/NOMS.2012.6211908},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/SadreSP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/MouraSSP12,
  author       = {Giovane Cesar Moreira Moura and
                  Ramin Sadre and
                  Anna Sperotto and
                  Aiko Pras},
  editor       = {Filip De Turck and
                  Luciano Paschoal Gaspary and
                  Deep Medhi},
  title        = {Internet bad neighborhoods aggregation},
  booktitle    = {2012 {IEEE} Network Operations and Management Symposium, {NOMS} 2012,
                  Maui, HI, USA, April 16-20, 2012},
  pages        = {343--350},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/NOMS.2012.6211917},
  doi          = {10.1109/NOMS.2012.6211917},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/noms/MouraSSP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip6-6/HofstedeDSP11,
  author       = {Rick Hofstede and
                  Idilio Drago and
                  Anna Sperotto and
                  Aiko Pras},
  editor       = {Ralf Lehnert},
  title        = {Flow Monitoring Experiences at the Ethernet-Layer},
  booktitle    = {Energy-Aware Communications - 17th International Workshop, {EUNICE}
                  2011, Dresden, Germany, September 5-7, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6955},
  pages        = {134--145},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23541-2\_15},
  doi          = {10.1007/978-3-642-23541-2\_15},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip6-6/HofstedeDSP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/SperottoP11,
  author       = {Anna Sperotto and
                  Aiko Pras},
  editor       = {Nazim Agoulmine and
                  Claudio Bartolini and
                  Tom Pfeifer and
                  Declan O'Sullivan},
  title        = {Flow-based intrusion detection},
  booktitle    = {Proceedings of the 12th {IFIP/IEEE} International Symposium on Integrated
                  Network Management, {IM} 2011, Dublin, Ireland, 23-27 May 2011},
  pages        = {958--963},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/INM.2011.5990529},
  doi          = {10.1109/INM.2011.5990529},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/im/SperottoP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Sperotto10,
  author       = {Anna Sperotto},
  title        = {Flow-based intrusion detection},
  school       = {University of Twente, Enschede, Netherlands},
  year         = {2010},
  url          = {http://eprints.eemcs.utwente.nl/18649/},
  timestamp    = {Mon, 10 Apr 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/Sperotto10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/SperottoSSMPS10,
  author       = {Anna Sperotto and
                  Gregor Schaffrath and
                  Ramin Sadre and
                  Cristian Morariu and
                  Aiko Pras and
                  Burkhard Stiller},
  title        = {An Overview of {IP} Flow-Based Intrusion Detection},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {12},
  number       = {3},
  pages        = {343--356},
  year         = {2010},
  url          = {https://doi.org/10.1109/SURV.2010.032210.00054},
  doi          = {10.1109/SURV.2010.032210.00054},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/SperottoSSMPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip6-6/HofstedeSFP10,
  author       = {Rick Hofstede and
                  Anna Sperotto and
                  Tiago Fioreze and
                  Aiko Pras},
  editor       = {Finn Arve Aagesen and
                  Svein J. Knapskog},
  title        = {The Network Data Handling War: MySQL vs. NfDump},
  booktitle    = {Networked Services and Applications - Engineering, Control and Management,
                  16th {EUNICE/IFIP} {WG} 6.6 Workshop, {EUNICE} 2010, Trondheim, Norway,
                  June 28-30, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6164},
  pages        = {167--176},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13971-0\_16},
  doi          = {10.1007/978-3-642-13971-0\_16},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip6-6/HofstedeSFP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/PrasSSFHS09,
  author       = {Aiko Pras and
                  Ramin Sadre and
                  Anna Sperotto and
                  Tiago Fioreze and
                  David Hausheer and
                  J{\"{u}}rgen Sch{\"{o}}nw{\"{a}}lder},
  title        = {Using NetFlow/IPFIX for Network Management},
  journal      = {J. Netw. Syst. Manag.},
  volume       = {17},
  number       = {4},
  pages        = {482--487},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10922-009-9138-0},
  doi          = {10.1007/S10922-009-9138-0},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnsm/PrasSSFHS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsom/SperottoSBP09,
  author       = {Anna Sperotto and
                  Ramin Sadre and
                  Pieter{-}Tjerk de Boer and
                  Aiko Pras},
  editor       = {Claudio Bartolini and
                  Luciano Paschoal Gaspary},
  title        = {Hidden Markov Model Modeling of {SSH} Brute-Force Attacks},
  booktitle    = {Integrated Management of Systems, Services, Processes and People in
                  IT, 20th {IFIP/IEEE} International Workshop on Distributed Systems:
                  Operations and Management, {DSOM} 2009, Venice, Italy, October 27-28,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5841},
  pages        = {164--176},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04989-7\_13},
  doi          = {10.1007/978-3-642-04989-7\_13},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/dsom/SperottoSBP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip6-6/SperottoVSP09,
  author       = {Anna Sperotto and
                  Gert Vliek and
                  Ramin Sadre and
                  Aiko Pras},
  editor       = {Miquel Oliver and
                  Sebasti{\`{a}} Sallent},
  title        = {Detecting Spam at the Network Level},
  booktitle    = {The Internet of the Future, 15th Open European Summer School and {IFIP}
                  {TC6.6} Workshop, {EUNICE} 2009, Barcelona, Spain, September 7-9,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5733},
  pages        = {208--216},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03700-9\_22},
  doi          = {10.1007/978-3-642-03700-9\_22},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip6-6/SperottoVSP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/FiorezeGPSS09,
  author       = {Tiago Fioreze and
                  Lisandro Zambenedetti Granville and
                  Aiko Pras and
                  Anna Sperotto and
                  Ramin Sadre},
  title        = {Self-management of hybrid networks: Can we trust netflow data?},
  booktitle    = {Integrated Network Management, {IM} 2009. 11th {IFIP/IEEE} International
                  Symposium on Integrated Network Management, Hofstra University, Long
                  Island, NY, USA, June 1-5, 2009},
  pages        = {577--584},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/INM.2009.5188864},
  doi          = {10.1109/INM.2009.5188864},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/im/FiorezeGPSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipom/SperottoSVP09,
  author       = {Anna Sperotto and
                  Ramin Sadre and
                  Frank E. van Vliet and
                  Aiko Pras},
  editor       = {Giorgio Nunzi and
                  Caterina M. Scoglio and
                  Xing Li},
  title        = {A Labeled Data Set for Flow-Based Intrusion Detection},
  booktitle    = {{IP} Operations and Management, 9th {IEEE} International Workshop,
                  {IPOM} 2009, Venice, Italy, October 29-30, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5843},
  pages        = {39--50},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04968-2\_4},
  doi          = {10.1007/978-3-642-04968-2\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ipom/SperottoSVP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipom/SperottoSP08,
  author       = {Anna Sperotto and
                  Ramin Sadre and
                  Aiko Pras},
  editor       = {Nail Akar and
                  Michal Pi{\'{o}}ro and
                  Charalabos Skianis},
  title        = {Anomaly Characterization in Flow-Based Traffic Time Series},
  booktitle    = {{IP} Operations and Management, 8th {IEEE} International Workshop,
                  {IPOM} 2008, Samos Island, Greece, September 22-26, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5275},
  pages        = {15--27},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87357-0\_2},
  doi          = {10.1007/978-3-540-87357-0\_2},
  timestamp    = {Sun, 02 Oct 2022 16:08:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ipom/SperottoSP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aims/SperottoM07,
  author       = {Anna Sperotto and
                  Remco van de Meent},
  editor       = {Arosha K. Bandara and
                  Mark Burgess},
  title        = {A Survey of the High-Speed Self-learning Intrusion Detection Research
                  Area},
  booktitle    = {Inter-Domain Management, First International Conference on Autonomous
                  Infrastructure, Management and Security, {AIMS} 2007, Oslo, Norway,
                  June 21-22, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4543},
  pages        = {196--199},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72986-0\_24},
  doi          = {10.1007/978-3-540-72986-0\_24},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/aims/SperottoM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emmcvpr/SperottoP07,
  author       = {Anna Sperotto and
                  Marcello Pelillo},
  editor       = {Alan L. Yuille and
                  Song Chun Zhu and
                  Daniel Cremers and
                  Yongtian Wang},
  title        = {Szemer{\'{e}}di's Regularity Lemma and Its Applications to Pairwise
                  Clustering and Segmentation},
  booktitle    = {Energy Minimization Methods in Computer Vision and Pattern Recognition,
                  6th International Conference, {EMMCVPR} 2007, Ezhou, China, August
                  27-29, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4679},
  pages        = {13--27},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74198-5\_2},
  doi          = {10.1007/978-3-540-74198-5\_2},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/emmcvpr/SperottoP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics