Internet of Things in healthcare: Interoperatibility and security issues LMR Tarouco, LM Bertholdo, LZ Granville, LMR Arbiza, F Carbone, ... 2012 IEEE international conference on communications (ICC), 6121-6125, 2012 | 272 | 2012 |
Booters-An analysis of DDoS-as-a-Service Attacks JJ Santanna, R van Rijswijk-Deij, A Sperotto, R Hofstede, M Wierbosch, ... Proceedings of the 14th IFIP/IEEE Symposium on Integrated Network and …, 2014 | 253 | 2014 |
Inside booters: An analysis on operational databases JJ Santanna, R Durban, A Sperotto, A Pras 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015 | 45 | 2015 |
Characterizing and mitigating the DDoS-as-a-service phenomenon JJ Santanna, A Sperotto Monitoring and Securing Virtualized Networks and Services: 8th IFIP WG 6.6 …, 2014 | 35 | 2014 |
Are darknets all the same? On darknet visibility for security monitoring F Soro, I Drago, M Trevisan, M Mellia, J Ceron, JJ Santanna 2019 IEEE international symposium on local and metropolitan area networks …, 2019 | 30 | 2019 |
Booter blacklist: Unveiling DDoS-for-hire websites JJ Santanna, RO De Schmidt, D Tuncer, J De Vries, LZ Granville, A Pras 2016 12th International Conference on Network and Service Management (CNSM …, 2016 | 19 | 2016 |
DDoS 3.0-How terrorists bring down the Internet A Pras, JJ Santanna, J Steinberger, A Sperotto Measurement, Modelling and Evaluation of Dependable Computer and …, 2016 | 19 | 2016 |
Through the Internet of Things--A Management by Delegation Smart Object Aware System (MbDSAS) MA Marotta, FJ Carbone, JJC de Santanna, LMR Tarouco 2013 IEEE 37th Annual Computer Software and Applications Conference, 732-741, 2013 | 18 | 2013 |
Booters: can anything justify distributed denial-of-service (DDoS) attacks for hire? D Douglas, JJ Santanna, R de Oliveira Schmidt, LZ Granville, A Pras Journal of information, communication and ethics in society 15 (01), 90-104, 2017 | 17 | 2017 |
How asymmetric is the internet? a study to support the use of traceroute W De Vries, JJ Santanna, A Sperotto, A Pras Intelligent Mechanisms for Network Configuration and Security: 9th IFIP WG 6 …, 2015 | 17 | 2015 |
DDoS-as-a-Service: investigating booter websites JJC de Santanna | 13 | 2017 |
Characterisation of the kelihos. b botnet M Kerkers, JJ Santanna, A Sperotto Monitoring and Securing Virtualized Networks and Services: 8th IFIP WG 6.6 …, 2014 | 11 | 2014 |
Booter websites characterization: Towards a list of threats JJ Chromik, JJC de Santanna, A Sperotto, A Pras 33rd Brazilian Symposium on Computer Networks and Distributed Systems, SBRC …, 2015 | 9 | 2015 |
Towards validation of the Internet Census 2012 D Maan, JJ Santanna, A Sperotto, P De Boer Advances in Communication Networking: 20th EUNICE/IFIP EG 6.2, 6.6 …, 2014 | 9 | 2014 |
A BPM-based solution for inter-domain circuit management JJC de Santanna, JA Wickboldt, LZ Granville 2012 IEEE Network Operations and Management Symposium, 385-392, 2012 | 9 | 2012 |
The Effect of the Russian-Ukrainian Conflict from the Perspective of Internet eXchanges C Trusin, L Bertholdo, JJ Santanna 2022 18th International Conference on Network and Service Management (CNSM …, 2022 | 6 | 2022 |
Booter list generation: The basis for investigating DDoS‐for‐hire websites JJ Santanna, J de Vries, R de O. Schmidt, D Tuncer, L Z. Granville, A Pras International journal of network management 28 (1), e2008, 2018 | 6 | 2018 |
Quiet Dogs Can Bite: Which Booters Should We Go After, and What Are Our Mitigation Options? JJ Santanna, RO Schmidt, D Tuncer, A Sperotto, LZ Granville, A Pras IEEE Communications Magazine 55 (7), 50-56, 2017 | 5 | 2017 |
“LUDO”–KIDS PLAYING DISTRIBUTED DENIAL OF SERVICE J Steinberger, JJ Santanna, E Spatharas, H Amler, N Breuer, K Graul, ... TERENA Networking Conference (TNC), 2016 | 2 | 2016 |
Whom do we trust-Booters and SSL/TLS certificates J Steinberger, B Kuhnert, S Alavi, JJC de Santanna, A Sperotto, H Baier, ... 11th SPRING graduate workshop of the special interest group Security …, 2016 | | 2016 |