BibTeX records: Johann Schlamp

download as .bib file

@phdthesis{DBLP:phd/dnb/Schlamp16,
  author    = {Johann Schlamp},
  title     = {An Evaluation of Architectural Threats to Internet Routing},
  school    = {Technical University Munich, Germany},
  year      = {2016},
  url       = {https://nbn-resolving.org/urn:nbn:de:bvb:91-diss-20160725-1296757-1-0},
  urn       = {urn:nbn:de:bvb:91-diss-20160725-1296757-1-0},
  isbn      = {978-3-937201-53-5},
  timestamp = {Wed, 12 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/phd/dnb/Schlamp16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/SchlampHJCB16,
  author    = {Johann Schlamp and
               Ralph Holz and
               Quentin Jacquemart and
               Georg Carle and
               Ernst W. Biersack},
  title     = {{HEAP:} Reliable Assessment of {BGP} Hijacking Attacks},
  journal   = {{IEEE} J. Sel. Areas Commun.},
  volume    = {34},
  number    = {6},
  pages     = {1849--1861},
  year      = {2016},
  url       = {https://doi.org/10.1109/JSAC.2016.2558978},
  doi       = {10.1109/JSAC.2016.2558978},
  timestamp = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jsac/SchlampHJCB16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SchlampWSCB16,
  author    = {Johann Schlamp and
               Matthias W{\"{a}}hlisch and
               Thomas C. Schmidt and
               Georg Carle and
               Ernst W. Biersack},
  title     = {{CAIR:} Using Formal Languages to Study Routing, Leaking, and Interception
               in {BGP}},
  journal   = {CoRR},
  volume    = {abs/1605.00618},
  year      = {2016},
  url       = {http://arxiv.org/abs/1605.00618},
  archivePrefix = {arXiv},
  eprint    = {1605.00618},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/SchlampWSCB16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SchlampHJCB16,
  author    = {Johann Schlamp and
               Ralph Holz and
               Quentin Jacquemart and
               Georg Carle and
               Ernst W. Biersack},
  title     = {{HEAP:} Reliable Assessment of {BGP} Hijacking Attacks},
  journal   = {CoRR},
  volume    = {abs/1607.00096},
  year      = {2016},
  url       = {http://arxiv.org/abs/1607.00096},
  archivePrefix = {arXiv},
  eprint    = {1607.00096},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/SchlampHJCB16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tma/SchlampHGKJCB15,
  author    = {Johann Schlamp and
               Ralph Holz and
               Oliver Gasser and
               Andreas Korsten and
               Quentin Jacquemart and
               Georg Carle and
               Ernst W. Biersack},
  editor    = {Moritz Steiner and
               Pere Barlet{-}Ros and
               Olivier Bonaventure},
  title     = {Investigating the Nature of Routing Anomalies: Closing in on Subprefix
               Hijacking Attacks},
  booktitle = {Traffic Monitoring and Analysis - 7th International Workshop, {TMA}
               2015, Barcelona, Spain, April 21-24, 2015. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9053},
  pages     = {173--187},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-17172-2\_12},
  doi       = {10.1007/978-3-319-17172-2\_12},
  timestamp = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/tma/SchlampHGKJCB15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tma/SchlampGWSC15,
  author    = {Johann Schlamp and
               Josef Gustafsson and
               Matthias W{\"{a}}hlisch and
               Thomas C. Schmidt and
               Georg Carle},
  editor    = {Moritz Steiner and
               Pere Barlet{-}Ros and
               Olivier Bonaventure},
  title     = {The Abandoned Side of the Internet: Hijacking Internet Resources When
               Domain Names Expire},
  booktitle = {Traffic Monitoring and Analysis - 7th International Workshop, {TMA}
               2015, Barcelona, Spain, April 21-24, 2015. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9053},
  pages     = {188--201},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-17172-2\_13},
  doi       = {10.1007/978-3-319-17172-2\_13},
  timestamp = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/tma/SchlampGWSC15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/BraunVSBC14,
  author    = {Lothar Braun and
               Mario Volke and
               Johann Schlamp and
               Alexander von Bodisco and
               Georg Carle},
  title     = {Flow-inspector: a framework for visualizing network flow data using
               current web technologies},
  journal   = {Computing},
  volume    = {96},
  number    = {1},
  pages     = {15--26},
  year      = {2014},
  url       = {https://doi.org/10.1007/s00607-013-0286-4},
  doi       = {10.1007/s00607-013-0286-4},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/computing/BraunVSBC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/VervierJSTCUBD14,
  author    = {Pierre{-}Antoine Vervier and
               Quentin Jacquemart and
               Johann Schlamp and
               Olivier Thonnard and
               Georg Carle and
               Guillaume Urvoy{-}Keller and
               Ernst W. Biersack and
               Marc Dacier},
  title     = {Malicious {BGP} hijacks: Appearances can be deceiving},
  booktitle = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney,
               Australia, June 10-14, 2014},
  pages     = {884--889},
  publisher = {{IEEE}},
  year      = {2014},
  url       = {https://doi.org/10.1109/ICC.2014.6883431},
  doi       = {10.1109/ICC.2014.6883431},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/conf/icc/VervierJSTCUBD14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SchlampGWSC14,
  author    = {Johann Schlamp and
               Josef Gustafsson and
               Matthias W{\"{a}}hlisch and
               Thomas C. Schmidt and
               Georg Carle},
  title     = {The Abandoned Side of the Internet: Hijacking Internet Resources When
               Domain Names Expire},
  journal   = {CoRR},
  volume    = {abs/1412.5052},
  year      = {2014},
  url       = {http://arxiv.org/abs/1412.5052},
  archivePrefix = {arXiv},
  eprint    = {1412.5052},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/SchlampGWSC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/SchlampCB13,
  author    = {Johann Schlamp and
               Georg Carle and
               Ernst W. Biersack},
  title     = {A forensic case study on as hijacking: the attacker's perspective},
  journal   = {Comput. Commun. Rev.},
  volume    = {43},
  number    = {2},
  pages     = {5--12},
  year      = {2013},
  url       = {https://doi.org/10.1145/2479957.2479959},
  doi       = {10.1145/2479957.2479959},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ccr/SchlampCB13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/SchlampCB12,
  author    = {Johann Schlamp and
               Georg Carle and
               Ernst W. Biersack},
  editor    = {Paolo Costa and
               Wenjun Hu and
               Vyas Sekar},
  title     = {How to prevent {AS} hijacking attacks},
  booktitle = {Proceedings of the 2012 {ACM} conference on CoNEXT student workshop,
               CoNEXT Student '12, Nice, France, December 10, 2012},
  pages     = {29--30},
  publisher = {{ACM}},
  year      = {2012},
  url       = {https://doi.org/10.1145/2413247.2413265},
  doi       = {10.1145/2413247.2413265},
  timestamp = {Wed, 21 Nov 2018 16:28:13 +0100},
  biburl    = {https://dblp.org/rec/conf/conext/SchlampCB12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/GuntherSC12,
  author    = {Stephan M. G{\"{u}}nther and
               Johann Schlamp and
               Georg Carle},
  editor    = {Filip De Turck and
               Luciano Paschoal Gaspary and
               Deep Medhi},
  title     = {Spring-based geolocation},
  booktitle = {2012 {IEEE} Network Operations and Management Symposium, {NOMS} 2012,
               Maui, HI, USA, April 16-20, 2012},
  pages     = {546--549},
  publisher = {{IEEE}},
  year      = {2012},
  url       = {https://doi.org/10.1109/NOMS.2012.6211952},
  doi       = {10.1109/NOMS.2012.6211952},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/conf/noms/GuntherSC12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics