Mattijs Jonker
Mattijs Jonker
Geverifieerd e-mailadres voor utwente.nl
Titel
Geciteerd door
Geciteerd door
Jaar
A High-Performance, Scalable Infrastructure for Large-Scale Active DNS Measurements
R van Rijswijk-Deij, M Jonker, A Sperotto, A Pras
IEEE Journal on Selected Areas in Communications 34 (6), 1877-1888, 2016
712016
Millions of targets under attack: a macroscopic characterization of the DoS ecosystem
M Jonker, A King, J Krupp, C Rossow, A Sperotto, A Dainotti
Proceedings of the 2017 Internet Measurement Conference, 100-113, 2017
472017
Measuring the Adoption of DDoS Protection Services
M Jonker, A Sperotto, R van Rijswijk-Deij, R Sadre, A Pras
Proceedings of the 2016 ACM on Internet Measurement Conference, 279-285, 2016
412016
On the adoption of the elliptic curve digital signature algorithm (ECDSA) in DNSSEC
R van Rijswijk-Deij, M Jonker, A Sperotto
2016 12th International Conference on Network and Service Management (CNSM …, 2016
172016
The Internet of names: A DNS big dataset
R van Rijswijk-Deij, M Jonker, A Sperotto, A Pras
Proceedings of the 2015 ACM Conference on Special Interest Group on Data …, 2015
162015
Flow-Based Web Application Brute-Force Attack and Compromise Detection
R Hofstede, M Jonker, A Sperotto, A Pras
Journal of Network and Systems Management 25 (4), 735-758, 2017
152017
On the Potential of BGP Flowspec for DDoS Mitigation at Two Sources: ISP and IXP
N Hinze, M Nawrocki, M Jonker, A Dainotti, TC Schmidt, M Wählisch
Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos, 57-59, 2018
102018
Unveiling flat traffic on the Internet: An SSH attack case study
M Jonker, R Hofstede, A Sperotto, A Pras
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015
102015
A First Joint Look at DoS Attacks and BGP Blackholing in the Wild
M Jonker, A Pras, A Dainotti, A Sperotto
Proceedings of the Internet Measurement Conference 2018, 457-463, 2018
92018
A first look at HTTP (S) intrusion detection using NetFlow/IPFIX
O van der Toorn, R Hofstede, M Jonker, A Sperotto
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015
72015
At home and abroad: The use of denial-of-service attacks during elections in nondemocratic regimes
PM Lutscher, NB Weidmann, ME Roberts, M Jonker, A King, A Dainotti
Journal of Conflict Resolution 64 (2-3), 373-401, 2020
52020
Mitigating DDoS Attacks Using OpenFlow-Based Software Defined Networking
M Jonker, A Sperotto
Intelligent Mechanisms for Network Configuration and Security, 129-133, 2015
52015
Measuring exposure in DDoS protection services
M Jonker, A Sperotto
2017 13th International Conference on Network and Service Management (CNSM), 1-9, 2017
42017
Poster: Collecting Contextual Information About a DDoS Attack Event Using Google Alerts
A Abhishta, R Joosten, M Jonker, W Kamerman, LJM Nieuwenhuis
32019
When parents and children disagree: Diving into DNS delegation inconsistency
R Sommese, GCM Moura, M Jonker, R van Rijswijk-Deij, A Dainotti, ...
International Conference on Passive and Active Network Measurement, 175-189, 2020
12020
DDoS Mitigation: A Measurement-Based Approach
M Jonker
12019
A Responsible Internet to Increase Trust in the Digital World
C Hesselman, P Grosso, R Holz, F Kuipers, JH Xue, M Jonker, J de Ruiter, ...
Journal of Network and Systems Management, 1-41, 2020
2020
The Forgotten Side of DNS: Orphan and Abandoned Records
R Sommese, M Jonker, R van Rijswijk-Deij, A Dainotti, A Sperotto
Workshop on Traffic Measurements for Cybersecurity, 2020
2020
Flow-based SSH Dictionary Attack Detection: the Effects of Aggregation
M Jonker
University of Twente, 2014
2014
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–19