


Остановите войну!
for scientists:
Roland van Rijswijk-Deij
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c36]Ramin Yazdani, Roland van Rijswijk-Deij, Mattijs Jonker, Anna Sperotto:
A Matter of Degree: Characterizing the Amplification Power of Open DNS Resolvers. PAM 2022: 293-318 - [i5]Eric Lanfer, Thomas Hänel, Roland van Rijswijk-Deij, Nils Aschenbruck:
Improving Proximity Estimation for Contact Tracing using a Multi-channel Approach. CoRR abs/2201.10401 (2022) - [i4]Olivier van der Toorn, Raffaele Sommese, Anna Sperotto, Roland van Rijswijk-Deij, Mattijs Jonker:
Saving Brian's Privacy: the Perils of Privacy Exposure through Reverse DNS. CoRR abs/2202.01160 (2022) - [i3]Koen van Hove, Jeroen van der Ham, Roland van Rijswijk-Deij:
Rpkiller: Threat Analysis from an RPKI Relying Party Perspective. CoRR abs/2203.00993 (2022) - 2021
- [c35]Olivier van der Toorn, Johannes Krupp, Mattijs Jonker, Roland van Rijswijk-Deij
, Christian Rossow, Anna Sperotto:
ANYway: Measuring the Amplification DDoS Potential of Domains. CNSM 2021: 500-508 - [c34]Leandro Marcio Bertholdo, João M. Ceron, Wouter B. de Vries, Ricardo de Oliveira Schmidt, Lisandro Zambenedetti Granville, Roland van Rijswijk-Deij, Aiko Pras:
TANGLED: A Cooperative Anycast Testbed. IM 2021: 766-771 - [c33]Leandro Marcio Bertholdo, João M. Ceron, Lisandro Zambenedetti Granville, Roland van Rijswijk-Deij:
Forecasting the Impact of IXP Outages Using Anycast. TMA 2021 - [c32]Raffaele Sommese, Gautam Akiwate, Mattijs Jonker, Giovane C. M. Moura, Marco Davids, Roland van Rijswijk-Deij, Geoffrey M. Voelker, Stefan Savage, Kimberly C. Claffy, Anna Sperotto:
Characterization of Anycast Adoption in the DNS Authoritative Infrastructure. TMA 2021 - 2020
- [j11]Moritz Müller, Jins de Jong, Maran van Heesch, Benno J. Overeinder, Roland van Rijswijk-Deij
:
Retrofitting post-quantum cryptography in internet protocols: a case study of DNSSEC. Comput. Commun. Rev. 50(4): 49-57 (2020) - [j10]Cristian Hesselman, Paola Grosso
, Ralph Holz
, Fernando Kuipers, Janet Hui Xue, Mattijs Jonker, Joeri de Ruiter
, Anna Sperotto, Roland van Rijswijk-Deij
, Giovane C. M. Moura, Aiko Pras, Cees de Laat:
A Responsible Internet to Increase Trust in the Digital World. J. Netw. Syst. Manag. 28(4): 882-922 (2020) - [j9]Wouter B. de Vries
, Roland van Rijswijk-Deij
, Pieter-Tjerk de Boer
, Aiko Pras:
Passive Observations of a Large DNS Service: 2.5 Years in the Life of Google. IEEE Trans. Netw. Serv. Manag. 17(1): 190-200 (2020) - [c31]Leandro Marcio Bertholdo, João M. Ceron, Lisandro Zambenedetti Granville, Giovane C. M. Moura, Cristian Hesselman, Roland van Rijswijk-Deij
:
BGP Anycast Tuner: Intuitive Route Management for Anycast Services. CNSM 2020: 1-7 - [c30]Nils Rodday, Ruben van Baaren, Luuk Hendriks, Roland van Rijswijk-Deij
, Aiko Pras, Gabi Dreo:
Evaluating RPKI ROV identification methodologies in automatically generated mininet topologies. CoNEXT 2020: 530-531 - [c29]Raffaele Sommese, Mattijs Jonker, Roland van Rijswijk-Deij
, Alberto Dainotti
, Kimberly C. Claffy, Anna Sperotto:
The Forgotten Side of DNS: Orphan and Abandoned Records. EuroS&P Workshops 2020: 538-543 - [c28]Olivier van der Toorn, Roland van Rijswijk-Deij
, Tobias Fiebig
, Martina Lindorfer, Anna Sperotto:
TXTing 101: Finding Security Issues in the Long Tail of DNS TXT Records. EuroS&P Workshops 2020: 544-549 - [c27]Moritz Müller, Willem Toorop, Taejoong Chung, Jelte Jansen, Roland van Rijswijk-Deij
:
The Reality of Algorithm Agility: Studying the DNSSEC Algorithm Life-Cycle. Internet Measurement Conference 2020: 295-308 - [c26]Raffaele Sommese, Leandro Marcio Bertholdo, Gautam Akiwate, Mattijs Jonker, Roland van Rijswijk-Deij
, Alberto Dainotti
, kc claffy, Anna Sperotto:
MAnycast2: Using Anycast to Measure Anycast. Internet Measurement Conference 2020: 456-463 - [c25]Wouter B. de Vries, Salman Aljammaz, Roland van Rijswijk-Deij
:
Global-Scale Anycast Network Management with Verfploeter. NOMS 2020: 1-9 - [c24]Raffaele Sommese, Giovane C. M. Moura, Mattijs Jonker, Roland van Rijswijk-Deij
, Alberto Dainotti
, Kimberly C. Claffy, Anna Sperotto:
When Parents and Children Disagree: Diving into DNS Delegation Inconsistency. PAM 2020: 175-189 - [c23]Hyeonmin Lee, Aniketh Gireesh, Roland van Rijswijk-Deij, Taekyoung Kwon, Taejoong Chung:
A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email. USENIX Security Symposium 2020: 613-630 - [i2]Leandro Marcio Bertholdo, João M. Ceron, Wouter B. de Vries, Ricardo de Oliveira Schmidt, Lisandro Zambenedetti Granville, Roland van Rijswijk-Deij
, Aiko Pras:
Tangled: A Cooperative Anycast Testbed. CoRR abs/2008.12881 (2020) - [i1]Sara Dickinson, Benno J. Overeinder, Roland van Rijswijk-Deij
, Allison Mankin:
Recommendations for DNS Privacy Service Operators. RFC 8932: 1-34 (2020)
2010 – 2019
- 2019
- [j8]Moritz Müller
, Taejoong Chung
, Alan Mislove, Roland van Rijswijk-Deij
:
Rolling With Confidence: Managing the Complexity of DNSSEC Operations. IEEE Trans. Netw. Serv. Manag. 16(3): 1199-1211 (2019) - [c22]Roland van Rijswijk-Deij, Gijs Rijnders, Matthijs Bomhoff, Luca Allodi:
Privacy-Conscious Threat Intelligence Using DNSBloom. IM 2019: 98-106 - [c21]Moritz Müller, Matthew Thomas, Duane Wessels, Wes Hardaker
, Taejoong Chung, Willem Toorop, Roland van Rijswijk-Deij
:
Roll, Roll, Roll your Root: A Comprehensive Analysis of the First Ever DNSSEC Root KSK Rollover. Internet Measurement Conference 2019: 1-14 - [c20]Taejoong Chung, Emile Aben, Tim Bruijnzeels, Balakrishnan Chandrasekaran
, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Roland van Rijswijk-Deij
, John P. Rula, Nick Sullivan:
RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins. Internet Measurement Conference 2019: 406-419 - [c19]Wouter B. de Vries, Quirin Scheitle, Moritz Müller, Willem Toorop, Ralph Dolmans, Roland van Rijswijk-Deij
:
A First Look at QNAME Minimization in the Domain Name System. PAM 2019: 147-160 - 2018
- [j7]Quirin Scheitle, Taejoong Chung, Jens Hiller
, Oliver Gasser, Johannes Naab, Roland van Rijswijk-Deij
, Oliver Hohlfeld
, Ralph Holz
, David R. Choffnes, Alan Mislove, Georg Carle:
A First Look at Certification Authority Authorization (CAA). Comput. Commun. Rev. 48(2): 10-23 (2018) - [j6]Abhishta Abhishta
, Roland van Rijswijk-Deij
, Lambert J. M. Nieuwenhuis:
Measuring the impact of a successful DDoS attack on the customer behaviour of managed DNS service providers. Comput. Commun. Rev. 48(5): 70-76 (2018) - [c18]Moritz Müller, Roland van Rijswijk-Deij:
Towards an Independent and Resilient DNS. AIMS 2018: 60-64 - [c17]Quirin Scheitle, Taejoong Chung, Johanna Amann, Oliver Gasser, Lexi Brent, Georg Carle, Ralph Holz, Jens Hiller, Johannes Naab, Roland van Rijswijk-Deij, Oliver Hohlfeld, David R. Choffnes, Alan Mislove:
Measuring Adoption of Security Additions to the HTTPS Ecosystem. ANRW 2018: 1-2 - [c16]Tho Le, Roland van Rijswijk-Deij
, Luca Allodi, Nicola Zannone
:
Economic incentives on DNSSEC deployment: Time to move from quantity to quality. NOMS 2018: 1-9 - [c15]Olivier van der Toorn, Roland van Rijswijk-Deij
, Bart Geesink, Anna Sperotto:
Melting the snow: Using active DNS measurements to detect snowshoe spam domains. NOMS 2018: 1-9 - [c14]Abhishta
, Roland van Rijswijk-Deij
, Lambert J. M. Nieuwenhuis:
Measuring the Impact of a Successful DDoS Attack on the Customer Behaviour of Managed DNS Service Providers. WTMC@SIGCOMM 2018: 1-7 - [c13]Wouter B. de Vries, Roland van Rijswijk-Deij, Pieter-Tjerk de Boer, Aiko Pras:
Passive Observations of a Large DNS Service: 2.5 Years in the Life of Google. TMA 2018: 1-8 - 2017
- [j5]Roland van Rijswijk-Deij
, Kaspar Hageman
, Anna Sperotto
, Aiko Pras:
The Performance Impact of Elliptic Curve Cryptography on DNSSEC Validation. IEEE/ACM Trans. Netw. 25(2): 738-750 (2017) - [j4]Taejoong Chung, Roland van Rijswijk-Deij, Balakrishnan Chandrasekaran, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson:
An End-to-End View of DNSSEC Ecosystem Management. login Usenix Mag. 42(4) (2017) - [c12]Taejoong Chung, Roland van Rijswijk-Deij
, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson:
Understanding the role of registrars in DNSSEC deployment. Internet Measurement Conference 2017: 369-383 - [c11]Luuk Hendriks, Ricardo de Oliveira Schmidt, Roland van Rijswijk-Deij, Aiko Pras:
On the Potential of IPv6 Open Resolvers for DDoS Attacks. PAM 2017: 17-29 - [c10]Roland van Rijswijk-Deij
, Taejoong Chung, David R. Choffnes, Alan Mislove, Willem Toorop:
The Root Canary: Monitoring and Measuring the DNSSEC Root Key Rollover. SIGCOMM Posters and Demos 2017: 63-64 - [c9]Anna Sperotto
, Olivier van der Toorn, Roland van Rijswijk-Deij
:
TIDE: Threat Identification Using Active DNS Measurements. SIGCOMM Posters and Demos 2017: 65-67 - [c8]Taejoong Chung, Roland van Rijswijk-Deij, Balakrishnan Chandrasekaran, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson:
A Longitudinal, End-to-End View of the DNSSEC Ecosystem. USENIX Security Symposium 2017: 1307-1322 - 2016
- [j3]Jeroen van der Ham
, Roland van Rijswijk-Deij
:
Ethics and Internet Measurements. J. Cyber Secur. Mobil. 5(4): 287-308 (2016) - [j2]Roland van Rijswijk-Deij
, Mattijs Jonker, Anna Sperotto
, Aiko Pras:
A High-Performance, Scalable Infrastructure for Large-Scale Active DNS Measurements. IEEE J. Sel. Areas Commun. 34(6): 1877-1888 (2016) - [c7]Roland van Rijswijk-Deij
, Mattijs Jonker, Anna Sperotto
:
On the adoption of the elliptic curve digital signature algorithm (ECDSA) in DNSSEC. CNSM 2016: 258-262 - [c6]Mattijs Jonker, Anna Sperotto, Roland van Rijswijk-Deij, Ramin Sadre, Aiko Pras:
Measuring the Adoption of DDoS Protection Services. Internet Measurement Conference 2016: 279-285 - 2015
- [j1]Roland van Rijswijk-Deij
, Anna Sperotto, Aiko Pras:
Making the Case for Elliptic Curves in DNSSEC. Comput. Commun. Rev. 45(5): 13-19 (2015) - [c5]José Jair Santanna, Roland van Rijswijk-Deij
, Rick Hofstede, Anna Sperotto
, Mark Wierbosch, Lisandro Zambenedetti Granville, Aiko Pras:
Booters - An analysis of DDoS-as-a-service attacks. IM 2015: 243-251 - [c4]Roland van Rijswijk-Deij
, Mattijs Jonker, Anna Sperotto
, Aiko Pras:
The Internet of Names: A DNS Big Dataset. SIGCOMM 2015: 91-92 - 2014
- [c3]Roland van Rijswijk-Deij
, Anna Sperotto
, Aiko Pras:
DNSSEC and its potential for DDoS attacks: a comprehensive measurement study. Internet Measurement Conference 2014: 449-460 - [c2]Sven Dietrich, Jeroen van der Ham
, Aiko Pras, Roland van Rijswijk-Deij
, Darren Shou, Anna Sperotto
, Aimee van Wynsberghe, Lenore D. Zuck:
Ethics in Data Sharing: Developing a Model for Best Practice. IEEE Symposium on Security and Privacy Workshops 2014: 5-9 - 2013
- [c1]Roland van Rijswijk-Deij, Erik Poll:
Using Trusted Execution Environments in Two-factor Authentication: comparing approaches. Open Identity Summit 2013: 20-31
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-04-11 22:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint