Volgen
Mattijs Jonker
Mattijs Jonker
Geverifieerd e-mailadres voor utwente.nl - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Millions of targets under attack: a macroscopic characterization of the DoS ecosystem
M Jonker, A King, J Krupp, C Rossow, A Sperotto, A Dainotti
Proceedings of the 2017 Internet Measurement Conference, 100-113, 2017
1762017
A High-Performance, Scalable Infrastructure for Large-Scale Active DNS Measurements
R van Rijswijk-Deij, M Jonker, A Sperotto, A Pras
IEEE Journal on Selected Areas in Communications 34 (6), 1877-1888, 2016
1512016
Measuring the Adoption of DDoS Protection Services
M Jonker, A Sperotto, R van Rijswijk-Deij, R Sadre, A Pras
Proceedings of the 2016 ACM on Internet Measurement Conference, 279-285, 2016
952016
Flow-Based Web Application Brute-Force Attack and Compromise Detection
R Hofstede, M Jonker, A Sperotto, A Pras
Journal of Network and Systems Management 25 (4), 735-758, 2017
572017
A Responsible Internet to Increase Trust in the Digital World
C Hesselman, P Grosso, R Holz, F Kuipers, JH Xue, M Jonker, J de Ruiter, ...
Journal of Network and Systems Management 28 (4), 882-922, 2020
512020
At home and abroad: The use of denial-of-service attacks during elections in nondemocratic regimes
PM Lutscher, NB Weidmann, ME Roberts, M Jonker, A King, A Dainotti
Journal of Conflict Resolution 64 (2-3), 373-401, 2020
492020
When parents and children disagree: Diving into DNS delegation inconsistency
R Sommese, GCM Moura, M Jonker, R van Rijswijk-Deij, A Dainotti, ...
International Conference on Passive and Active Network Measurement, 175-189, 2020
362020
A First Joint Look at DoS Attacks and BGP Blackholing in the Wild
M Jonker, A Pras, A Dainotti, A Sperotto
Proceedings of the Internet Measurement Conference 2018, 457-463, 2018
362018
On the adoption of the elliptic curve digital signature algorithm (ECDSA) in DNSSEC
R van Rijswijk-Deij, M Jonker, A Sperotto
2016 12th International Conference on Network and Service Management (CNSM …, 2016
312016
The far side of DNS amplification: tracing the DDoS attack ecosystem from the internet core
M Nawrocki, M Jonker, TC Schmidt, M Wählisch
Proceedings of the 21st ACM Internet Measurement Conference, 419-434, 2021
302021
MAnycast2: Using Anycast to Measure Anycast
R Sommese, L Bertholdo, G Akiwate, M Jonker, R van Rijswijk-Deij, ...
Proceedings of the ACM Internet Measurement Conference, 456-463, 2020
302020
Unresolved Issues: Prevalence, Persistence, and Perils of Lame Delegations
G Akiwate, M Jonker, R Sommese, I Foster, GM Voelker, S Savage, ...
Proceedings of the ACM Internet Measurement Conference, 281-294, 2020
252020
On the Potential of BGP Flowspec for DDoS Mitigation at Two Sources: ISP and IXP
N Hinze, M Nawrocki, M Jonker, A Dainotti, TC Schmidt, M Wählisch
Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos, 57-59, 2018
212018
The Internet of names: A DNS big dataset
R van Rijswijk-Deij, M Jonker, A Sperotto, A Pras
Proceedings of the 2015 ACM Conference on Special Interest Group on Data …, 2015
212015
Investigating the impact of DDoS attacks on DNS infrastructure
R Sommese, KC Claffy, R van Rijswijk-Deij, A Chattopadhyay, A Dainotti, ...
Proceedings of the 22nd ACM Internet Measurement Conference, 51-64, 2022
202022
Who's got your mail? Characterizing mail service provider usage
E Liu, G Akiwate, M Jonker, A Mirian, S Savage, GM Voelker
Proceedings of the 21st ACM Internet Measurement Conference, 122-136, 2021
202021
Unveiling flat traffic on the Internet: An SSH attack case study
M Jonker, R Hofstede, A Sperotto, A Pras
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015
202015
Characterization of Anycast Adoption in the DNS Authoritative Infrastructure
R Sommese, G Akiwate, M Jonker, GCM Moura, M Davids, ...
Network Traffic Measurement and Analysis Conference (TMA'21), 2021
172021
Hosting Industry Centralization and Consolidation
L Zembruzki, R Sommese, LZ Granville, AS Jacobs, M Jonker, ...
NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, 1-9, 2022
162022
A first look at HTTP (S) intrusion detection using NetFlow/IPFIX
O van der Toorn, R Hofstede, M Jonker, A Sperotto
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015
162015
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20