Follow
Jair Santanna
Jair Santanna
Assistant professor, University of Twente
Verified email at utwente.nl - Homepage
Title
Cited by
Cited by
Year
Internet of Things in healthcare: Interoperatibility and security issues
LMR Tarouco, LM Bertholdo, LZ Granville, LMR Arbiza, F Carbone, ...
2012 IEEE international conference on communications (ICC), 6121-6125, 2012
2722012
Booters-An analysis of DDoS-as-a-Service Attacks
JJ Santanna, R van Rijswijk-Deij, A Sperotto, R Hofstede, M Wierbosch, ...
Proceedings of the 14th IFIP/IEEE Symposium on Integrated Network and …, 2014
2532014
Inside booters: An analysis on operational databases
JJ Santanna, R Durban, A Sperotto, A Pras
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015
452015
Characterizing and mitigating the DDoS-as-a-service phenomenon
JJ Santanna, A Sperotto
Monitoring and Securing Virtualized Networks and Services: 8th IFIP WG 6.6 …, 2014
352014
Are darknets all the same? On darknet visibility for security monitoring
F Soro, I Drago, M Trevisan, M Mellia, J Ceron, JJ Santanna
2019 IEEE international symposium on local and metropolitan area networks …, 2019
302019
Booter blacklist: Unveiling DDoS-for-hire websites
JJ Santanna, RO De Schmidt, D Tuncer, J De Vries, LZ Granville, A Pras
2016 12th International Conference on Network and Service Management (CNSM …, 2016
192016
DDoS 3.0-How terrorists bring down the Internet
A Pras, JJ Santanna, J Steinberger, A Sperotto
Measurement, Modelling and Evaluation of Dependable Computer and …, 2016
192016
Through the Internet of Things--A Management by Delegation Smart Object Aware System (MbDSAS)
MA Marotta, FJ Carbone, JJC de Santanna, LMR Tarouco
2013 IEEE 37th Annual Computer Software and Applications Conference, 732-741, 2013
182013
Booters: can anything justify distributed denial-of-service (DDoS) attacks for hire?
D Douglas, JJ Santanna, R de Oliveira Schmidt, LZ Granville, A Pras
Journal of information, communication and ethics in society 15 (01), 90-104, 2017
172017
How asymmetric is the internet? a study to support the use of traceroute
W De Vries, JJ Santanna, A Sperotto, A Pras
Intelligent Mechanisms for Network Configuration and Security: 9th IFIP WG 6 …, 2015
172015
DDoS-as-a-Service: investigating booter websites
JJC de Santanna
132017
Characterisation of the kelihos. b botnet
M Kerkers, JJ Santanna, A Sperotto
Monitoring and Securing Virtualized Networks and Services: 8th IFIP WG 6.6 …, 2014
112014
Booter websites characterization: Towards a list of threats
JJ Chromik, JJC de Santanna, A Sperotto, A Pras
33rd Brazilian Symposium on Computer Networks and Distributed Systems, SBRC …, 2015
92015
Towards validation of the Internet Census 2012
D Maan, JJ Santanna, A Sperotto, P De Boer
Advances in Communication Networking: 20th EUNICE/IFIP EG 6.2, 6.6 …, 2014
92014
A BPM-based solution for inter-domain circuit management
JJC de Santanna, JA Wickboldt, LZ Granville
2012 IEEE Network Operations and Management Symposium, 385-392, 2012
92012
The Effect of the Russian-Ukrainian Conflict from the Perspective of Internet eXchanges
C Trusin, L Bertholdo, JJ Santanna
2022 18th International Conference on Network and Service Management (CNSM …, 2022
62022
Booter list generation: The basis for investigating DDoS‐for‐hire websites
JJ Santanna, J de Vries, R de O. Schmidt, D Tuncer, L Z. Granville, A Pras
International journal of network management 28 (1), e2008, 2018
62018
Quiet Dogs Can Bite: Which Booters Should We Go After, and What Are Our Mitigation Options?
JJ Santanna, RO Schmidt, D Tuncer, A Sperotto, LZ Granville, A Pras
IEEE Communications Magazine 55 (7), 50-56, 2017
52017
“LUDO”–KIDS PLAYING DISTRIBUTED DENIAL OF SERVICE
J Steinberger, JJ Santanna, E Spatharas, H Amler, N Breuer, K Graul, ...
TERENA Networking Conference (TNC), 2016
22016
Whom do we trust-Booters and SSL/TLS certificates
J Steinberger, B Kuhnert, S Alavi, JJC de Santanna, A Sperotto, H Baier, ...
11th SPRING graduate workshop of the special interest group Security …, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–20