
BibTeX records: Johann Schlamp
@phdthesis{DBLP:phd/dnb/Schlamp16, author = {Johann Schlamp}, title = {An Evaluation of Architectural Threats to Internet Routing}, school = {Technical University Munich, Germany}, year = {2016}, url = {https://nbn-resolving.org/urn:nbn:de:bvb:91-diss-20160725-1296757-1-0}, urn = {urn:nbn:de:bvb:91-diss-20160725-1296757-1-0}, isbn = {978-3-937201-53-5}, timestamp = {Wed, 12 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/dnb/Schlamp16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/SchlampHJCB16, author = {Johann Schlamp and Ralph Holz and Quentin Jacquemart and Georg Carle and Ernst W. Biersack}, title = {{HEAP:} Reliable Assessment of {BGP} Hijacking Attacks}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {34}, number = {6}, pages = {1849--1861}, year = {2016}, url = {https://doi.org/10.1109/JSAC.2016.2558978}, doi = {10.1109/JSAC.2016.2558978}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/SchlampHJCB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SchlampWSCB16, author = {Johann Schlamp and Matthias W{\"{a}}hlisch and Thomas C. Schmidt and Georg Carle and Ernst W. Biersack}, title = {{CAIR:} Using Formal Languages to Study Routing, Leaking, and Interception in {BGP}}, journal = {CoRR}, volume = {abs/1605.00618}, year = {2016}, url = {http://arxiv.org/abs/1605.00618}, archivePrefix = {arXiv}, eprint = {1605.00618}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SchlampWSCB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SchlampHJCB16, author = {Johann Schlamp and Ralph Holz and Quentin Jacquemart and Georg Carle and Ernst W. Biersack}, title = {{HEAP:} Reliable Assessment of {BGP} Hijacking Attacks}, journal = {CoRR}, volume = {abs/1607.00096}, year = {2016}, url = {http://arxiv.org/abs/1607.00096}, archivePrefix = {arXiv}, eprint = {1607.00096}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SchlampHJCB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tma/SchlampHGKJCB15, author = {Johann Schlamp and Ralph Holz and Oliver Gasser and Andreas Korsten and Quentin Jacquemart and Georg Carle and Ernst W. Biersack}, editor = {Moritz Steiner and Pere Barlet{-}Ros and Olivier Bonaventure}, title = {Investigating the Nature of Routing Anomalies: Closing in on Subprefix Hijacking Attacks}, booktitle = {Traffic Monitoring and Analysis - 7th International Workshop, {TMA} 2015, Barcelona, Spain, April 21-24, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9053}, pages = {173--187}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17172-2\_12}, doi = {10.1007/978-3-319-17172-2\_12}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tma/SchlampHGKJCB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tma/SchlampGWSC15, author = {Johann Schlamp and Josef Gustafsson and Matthias W{\"{a}}hlisch and Thomas C. Schmidt and Georg Carle}, editor = {Moritz Steiner and Pere Barlet{-}Ros and Olivier Bonaventure}, title = {The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire}, booktitle = {Traffic Monitoring and Analysis - 7th International Workshop, {TMA} 2015, Barcelona, Spain, April 21-24, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9053}, pages = {188--201}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17172-2\_13}, doi = {10.1007/978-3-319-17172-2\_13}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tma/SchlampGWSC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/BraunVSBC14, author = {Lothar Braun and Mario Volke and Johann Schlamp and Alexander von Bodisco and Georg Carle}, title = {Flow-inspector: a framework for visualizing network flow data using current web technologies}, journal = {Computing}, volume = {96}, number = {1}, pages = {15--26}, year = {2014}, url = {https://doi.org/10.1007/s00607-013-0286-4}, doi = {10.1007/s00607-013-0286-4}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/BraunVSBC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/VervierJSTCUBD14, author = {Pierre{-}Antoine Vervier and Quentin Jacquemart and Johann Schlamp and Olivier Thonnard and Georg Carle and Guillaume Urvoy{-}Keller and Ernst W. Biersack and Marc Dacier}, title = {Malicious {BGP} hijacks: Appearances can be deceiving}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney, Australia, June 10-14, 2014}, pages = {884--889}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICC.2014.6883431}, doi = {10.1109/ICC.2014.6883431}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/VervierJSTCUBD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SchlampGWSC14, author = {Johann Schlamp and Josef Gustafsson and Matthias W{\"{a}}hlisch and Thomas C. Schmidt and Georg Carle}, title = {The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire}, journal = {CoRR}, volume = {abs/1412.5052}, year = {2014}, url = {http://arxiv.org/abs/1412.5052}, archivePrefix = {arXiv}, eprint = {1412.5052}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SchlampGWSC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/SchlampCB13, author = {Johann Schlamp and Georg Carle and Ernst W. Biersack}, title = {A forensic case study on as hijacking: the attacker's perspective}, journal = {Comput. Commun. Rev.}, volume = {43}, number = {2}, pages = {5--12}, year = {2013}, url = {https://doi.org/10.1145/2479957.2479959}, doi = {10.1145/2479957.2479959}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/SchlampCB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/SchlampCB12, author = {Johann Schlamp and Georg Carle and Ernst W. Biersack}, editor = {Paolo Costa and Wenjun Hu and Vyas Sekar}, title = {How to prevent {AS} hijacking attacks}, booktitle = {Proceedings of the 2012 {ACM} conference on CoNEXT student workshop, CoNEXT Student '12, Nice, France, December 10, 2012}, pages = {29--30}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2413247.2413265}, doi = {10.1145/2413247.2413265}, timestamp = {Wed, 21 Nov 2018 16:28:13 +0100}, biburl = {https://dblp.org/rec/conf/conext/SchlampCB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/GuntherSC12, author = {Stephan M. G{\"{u}}nther and Johann Schlamp and Georg Carle}, editor = {Filip De Turck and Luciano Paschoal Gaspary and Deep Medhi}, title = {Spring-based geolocation}, booktitle = {2012 {IEEE} Network Operations and Management Symposium, {NOMS} 2012, Maui, HI, USA, April 16-20, 2012}, pages = {546--549}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/NOMS.2012.6211952}, doi = {10.1109/NOMS.2012.6211952}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/noms/GuntherSC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.