Maciej Korczyński
Maciej Korczyński
Associate Professor, Grenoble Alpes University - Grenoble INP Ensimag
Zweryfikowany adres z univ-grenoble-alpes.fr - Strona główna
Cytowane przez
Cytowane przez
Tranco: A research-oriented top sites ranking hardened against manipulation
VL Pochat, T Van Goethem, S Tajalizadehkhoob, M Korczyński, W Joosen
Proceedings of the 26th Network and Distributed System Security Symposium …, 2019
Markov chain fingerprinting to classify encrypted traffic
M Korczyński, A Duda
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 781-789, 2014
Clusters in the expanse: Understanding and unbiasing IPv6 hitlists
O Gasser, Q Scheitle, P Foremski, Q Lone, M Korczyński, SD Strowes, ...
Proceedings of the Internet Measurement Conference 2018, 364-378, 2018
Make notifications great again: learning how to notify in the age of large-scale vulnerability scanning
O Cetin, C Ganan, M Korczynski, M Van Eeten
Workshop on the Economics of Information Security (WEIS) 23, 2017
In log we trust: Revealing poor security practices with certificate transparency logs and internet measurements
O Gasser, B Hof, M Helm, M Korczynski, R Holz, G Carle
Passive and Active Measurement: 19th International Conference, PAM 2018 …, 2018
Who gets the boot? analyzing victimization by ddos-as-a-service
A Noroozian, M Korczyński, CH Gañan, D Makita, K Yoshioka, ...
Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016
Cybercrime after the sunrise: A statistical analysis of DNS abuse in new gTLDs
M Korczynski, M Wullink, S Tajalizadehkhoob, GCM Moura, A Noroozian, ...
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
No domain left behind: is Let's Encrypt democratizing encryption?
M Aertsen, M Korczyński, GCM Moura, S Tajalizadehkhoob, ...
Proceedings of the applied networking research workshop, 48-54, 2017
Herding vulnerable cats: a statistical approach to disentangle joint responsibility for web security in shared hosting
S Tajalizadehkhoob, T Van Goethem, M Korczyński, A Noroozian, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Classifying service flows in the encrypted skype traffic
M Korczyński, A Duda
2012 IEEE International Conference on Communications (ICC), 1064-1068, 2012
Hive oversight for network intrusion early warning using DIAMoND: a bee-inspired method for fully distributed cyber defense
M Korczynski, A Hamieh, JH Huh, H Holm, SR Rajagopalan, ...
IEEE Communications Magazine 54 (6), 60-67, 2016
COMAR: Classification of Compromised versus Maliciously Registered Domains
S Maroofi, M Korczynski, C Hesselman, B Ampeau, A Duda
IEEE European Symposium on Security and Privacy, 2020
Using loops observed in traceroute to infer the ability to spoof
Q Lone, M Luckie, M Korczyński, M Van Eeten
Passive and Active Measurement: 18th International Conference, PAM 2017 …, 2017
Apples, Oranges and Hosting Providers: Heterogeneity and Security in the Hosting Market
S Tajalizadehkhoob, M Korczynski, A Noroozian, C Ganán, M van Eeten
IEEE/IFIP Network Operations and Management Symposium (NOMS 2016 ), 2016
Zone poisoning: The how and where of non-secure DNS dynamic updates
M Korczyński, M Król, M Van Eeten
Proceedings of the 2016 Internet Measurement Conference, 271-278, 2016
Adoption of email anti-spoofing schemes: a large scale analysis
S Maroofi, M Korczyński, A Hölzel, A Duda
IEEE Transactions on Network and Service Management 18 (3), 3184-3196, 2021
Reputation metrics design to improve intermediary incentives for security of TLDs
M Korczynski, S Tajalizadehkhoob, A Noroozian, M Wullink, C Hesselman, ...
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 579-594, 2017
An accurate sampling scheme for detecting SYN flooding attacks and portscans
M Korczynski, L Janowski, A Duda
2011 IEEE International Conference on Communications (ICC), 1-5, 2011
Developing security reputation metrics for hosting providers
A Noroozian, M Korczynski, S Tajalizadehkhoob, M van Eeten
8th Workshop on Cyber Security Experimentation and Test (CSET 15), 2015
Are you human? resilience of phishing detection to evasion techniques based on human verification
S Maroofi, M Korczyński, A Duda
Proceedings of the ACM Internet Measurement Conference, 78-86, 2020
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20