Follow
Arman Noroozian
Arman Noroozian
European Center for Algorithmic Transparency (ECAT)
Verified email at ec.europa.eu - Homepage
Title
Cited by
Cited by
Year
Cybercrime After the Sunrise: A Statistical Analysis of DNS Abuse in New gTLDs
M Korczynski, M Wullink, S Tajalizadehkhoob, G Moura, A Noroozian, ...
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
602018
Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service
A Noroozian, M Korczynski, CH Ganan, D Makita, K Yoshioka, ...
Research in Attacks, Intrusions and Defenses (RAID), 2016
572016
Herding vulnerable cats: a statistical approach to disentangle joint responsibility for web security in shared hosting
S Tajalizadehkhoob, T Van Goethem, M Korczyński, A Noroozian, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
522017
Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting
A Noroozian, J Koenders, E van Veldhuizen, CH Ganan, S Alrwais, ...
28th {USENIX} Security Symposium ({USENIX} Security 19), 1341-1356, 2019
362019
Apples, Oranges and Hosting Providers: Heterogeneity and Security in the Hosting Market
S Tajalizadehkhoob, M Korczynski, A Noroozian, C Ganán, M van Eeten
Proceedings of IEEE/IFIP NOMS'16, 289-297, 2016
352016
Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs
M Korczynski, S Tajalizadehkhoob, A Noroozian, M Wullink, C Hesselman, ...
2017 IEEE European Symposium on Security and Privacy (Euro SP)(April 2017), 2017
322017
Developing Security Reputation Metrics for Hosting Providers
A Noroozian, M Korczynski, S TajalizadehKhoob, M van Eeten
Proceedings of the 8th USENIX Workshop on Cyber Security Experimentation and …, 2015
312015
Can ISPs Help Mitigate IoT Malware? A Longitudinal Study of Broadband ISP Security Efforts
A Noroozian, E Rodriguez, E Lastdrager, T Kasama, M van Eeten, ...
IEEE Euro S&P, 2021
172021
Go see a specialist? Predicting cybercrime sales on online anonymous markets from vendor and product characteristics
R van Wegberg, F Miedema, U Akyazi, A Noroozian, B Klievink, ...
The Web Conference (WWW'20), 2020
172020
The Role of Hosting Providers in Fighting Command and Control Infrastructure of Financial Malware
S Tajalizadehkhoob, C Gañán, A Noroozian, M Eeten
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
142017
Inferring the Security Performance of Providers from Noisy and Heterogenous Abuse Datasets
A Noroozian, M Ciere, M Korczynski, S Tajalizadehkhoob, M van Eeten
16th Workshop on the Economics of Information Security (WEIS), 2017
142017
Superspreaders: Quantifying the Role of IoT Manufacturers in Device Infections
E Rodríguez, A Noroozian, M van Eeten, C Gañán
WEIS, 2021
132021
User Compliance and Remediation Success After IoT Malware Notifications
E Rodriguez, S Verstegen, A Noroozian, D Inoue, T Kasama, M van Eeten, ...
Journal of Cybersecurity 7 (1), 2021
122021
Going Micro to Go Negative? Targeting Toxicity using Facebook and Instagram Ads
F Votta, A Noroozian, T Dobber, N Helberger, C de Vreese
Computational Communication Research, Volume 5, Issue 1, Jan 2023, 5 (Issue …, 2023
92023
Security Reputation Metrics
M Korczyński, A Noroozian
Encyclopedia of Cryptography, Security and Privacy, 2021
52021
Towards Simulating Heterogeneous Drivers with Cognitive Agents
A. Noroozian, K.V. Hindriks, C.M. Jonker
ICAART 2014 - Proceedings of the 6th International Conference on Agents and …, 2014
3*2014
How to design data access for researchers: A legal and software development perspective
M van Drunen, A Noroozian
Computer Law & Security Review 52, 105946, 2024
22024
Transparency and (no) more in the Political Advertising Regulation
M van Drunen, E Groen-Reijman, T Dobber, A Noroozian, P Leerssen, ...
Internet Policy Review, 2022
22022
Incentivizing Cooperation in P2P File Sharing - Indirect Interaction as an Incentive to Seed
A Noroozian, M de Weerdt, C Witteveen
Agents and Data Mining Interaction (LNCS) 7607, 36-50, 2013
22013
Birds of a Feather? A Comparative Analysis of DDoS Victimisation by IoT Botnet and Amplification Attacks
S Vetrivel, A Noroozian, D Makita, K Yoshioka, M van Eeten, CH Gañán
12022
The system can't perform the operation now. Try again later.
Articles 1–20