Follow
Maciej Korczyński
Maciej Korczyński
Associate Professor, Grenoble Alpes University - Grenoble INP Ensimag
Verified email at univ-grenoble-alpes.fr - Homepage
Title
Cited by
Cited by
Year
Tranco: A research-oriented top sites ranking hardened against manipulation
VL Pochat, T Van Goethem, S Tajalizadehkhoob, M Korczyński, W Joosen
Proceedings of the 26th Network and Distributed System Security Symposium …, 2018
2712018
Markov chain fingerprinting to classify encrypted traffic
M Korczyński, A Duda
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 781-789, 2014
1352014
Clusters in the expanse: Understanding and unbiasing IPv6 hitlists
O Gasser, Q Scheitle, P Foremski, Q Lone, M Korczyński, SD Strowes, ...
Proceedings of the Internet Measurement Conference 2018, 364-378, 2018
702018
Make notifications great again: learning how to notify in the age of large-scale vulnerability scanning
O Cetin, C Ganan, M Korczynski, M Van Eeten
Workshop on the Economics of Information Security (WEIS), 2017
432017
Who gets the boot? analyzing victimization by ddos-as-a-service
A Noroozian, M Korczyński, CH Gañan, D Makita, K Yoshioka, M Eeten
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2016
432016
No domain left behind: is Let's Encrypt democratizing encryption?
M Aertsen, M Korczyński, GCM Moura, S Tajalizadehkhoob, ...
Proceedings of the applied networking research workshop, 48-54, 2017
422017
Classifying service flows in the encrypted skype traffic
M Korczyński, A Duda
2012 IEEE International Conference on Communications (ICC), 1064-1068, 2012
382012
Hive oversight for network intrusion early warning using DIAMoND: a bee-inspired method for fully distributed cyber defense
M Korczynski, A Hamieh, JH Huh, H Holm, SR Rajagopalan, ...
IEEE Communications Magazine 54 (6), 60-67, 2016
362016
Cybercrime after the sunrise: A statistical analysis of DNS abuse in new gTLDs
M Korczynski, M Wullink, S Tajalizadehkhoob, GCM Moura, A Noroozian, ...
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
302018
Herding vulnerable cats: a statistical approach to disentangle joint responsibility for web security in shared hosting
S Tajalizadehkhoob, T Van Goethem, M Korczyński, A Noroozian, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
282017
In log we trust: revealing poor security practices with certificate transparency logs and internet measurements
O Gasser, B Hof, M Helm, M Korczynski, R Holz, G Carle
International Conference on Passive and Active Network Measurement, 173-185, 2018
272018
Apples, Oranges and Hosting Providers: Heterogeneity and Security in the Hosting Market
S Tajalizadehkhoob, M Korczynski, A Noroozian, C Ganán, M van Eeten
IEEE/IFIP Network Operations and Management Symposium (NOMS 2016 ), 2016
272016
An accurate sampling scheme for detecting SYN flooding attacks and portscans
M Korczynski, L Janowski, A Duda
2011 IEEE International Conference on Communications (ICC), 1-5, 2011
272011
Using loops observed in traceroute to infer the ability to spoof
Q Lone, M Luckie, M Korczyński, M Eeten
International Conference on Passive and Active Network Measurement, 229-241, 2017
252017
Reputation metrics design to improve intermediary incentives for security of TLDs
M Korczynski, S Tajalizadehkhoob, A Noroozian, M Wullink, C Hesselman, ...
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 579-594, 2017
222017
Zone poisoning: The how and where of non-secure DNS dynamic updates
M Korczyński, M Król, M Van Eeten
Proceedings of the 2016 Internet Measurement Conference, 271-278, 2016
222016
Developing security reputation metrics for hosting providers
A Noroozian, M Korczynski, S Tajalizadehkhoob, M van Eeten
8th Workshop on Cyber Security Experimentation and Test (CSET 15), 2015
222015
Don't Forget to Lock the Front Door! Inferring the Deployment of Source Address Validation of Inbound Traffic
M Korczyński, Y Nosyk, Q Lone, M Skwarek, B Jonglez, A Duda
International Conference on Passive and Active Network Measurement, 2020
152020
Using crowdsourcing marketplaces for network measurements: The case of spoofer
Q Lone, M Luckie, M Korczyński, H Asghari, M Javed, M Van Eeten
2018 Network Traffic Measurement and Analysis Conference (TMA), 1-8, 2018
152018
Stopping amplified DNS DDoS attacks through distributed query rate sharing
S Verma, A Hamieh, JH Huh, H Holm, SR Rajagopalan, M Korczynski, ...
2016 11th International Conference on Availability, Reliability and Security …, 2016
152016
The system can't perform the operation now. Try again later.
Articles 1–20