The role of internet service providers in botnet mitigation an empirical analysis based on spam data M Van Eeten, J Bauer, H Asghari, S Tabatabaie, D Rand OECD Publishing, 2010 | 133 | 2010 |
Deep packet inspection and bandwidth management: Battles over BitTorrent in Canada and the United States ML Mueller, H Asghari Telecommunications Policy, 2012 | 85 | 2012 |
{Post-Mortem} of a Zombie: Conficker Cleanup After Six Years H Asghari, M Ciere, MJG Van Eeten 24th USENIX Security Symposium (USENIX Security 15), 1-16, 2015 | 58 | 2015 |
The Impact of User Location on Cookie Notices (Inside and Outside of the European Union) R Van Eijk, H Asghari, P Winter, A Narayanan IEEE Workshop on Technology and Consumer Protection (ConPro’19)., 2019 | 51* | 2019 |
Security Collapse in the HTTPS Market: Assessing legal and technical solutions to secure HTTPS A Arnbak, H Asghari, M Van Eeten, N Van Eijk Queue 12 (8), 30-43, 2014 | 51 | 2014 |
Economics of fighting botnets: Lessons from a decade of mitigation H Asghari, MJG Van Eeten, JM Bauer IEEE Security & Privacy 13 (5), 16-23, 2015 | 47 | 2015 |
How dynamic is the isps address space? towards internet-wide dhcp churn estimation GCM Moura, C Ganán, Q Lone, P Poursaied, H Asghari, M van Eeten 2015 IFIP Networking Conference (IFIP Networking), 1-9, 2015 | 46 | 2015 |
Responsibility for Data Protection in a Networked World: On the Question of the Controller, Effective and Complete Protection and Its Application to Data Access Rights in Europe R Mahieu, J Van Hoboken, H Asghari J. Intell. Prop. Info. Tech. & Elec. Com. L. 10, 84, 2019 | 38 | 2019 |
Security economics in the HTTPS value chain H Asghari, M Van Eeten, A Arnbak, NANM van Eijk Twelfth Workshop on the Economics of Information Security (WEIS 2013 …, 2013 | 38 | 2013 |
AI for the public. How public interest theory shifts the discourse on AI T Züger, H Asghari AI & SOCIETY 38 (2), 815-828, 2023 | 36 | 2023 |
Collectively exercising the right of access: individual effort, societal effect R Mahieu, H Asghari, M van Eeten Internet Policy Review 7 (3), 2018 | 33 | 2018 |
Why them? Extracting intelligence about target selection from Zeus financial malware S Tajalizadehkhoob, H Asghari, C Gańán, M van Eeten Proceedings of the 13th Annual Workshop on the Economics of Information …, 2014 | 29 | 2014 |
Using crowdsourcing marketplaces for network measurements: The case of spoofer Q Lone, M Luckie, M Korczyński, H Asghari, M Javed, M Van Eeten 2018 Network Traffic Measurement and Analysis Conference (TMA), 1-8, 2018 | 25 | 2018 |
Internet service providers and botnet mitigation: a fact-finding study on the Dutch market MJG van Eeten, H Asghari, JM Bauer, S Tabatabaie | 24 | 2011 |
Measuring the Brussels Effect through Access Requests: Has the European General Data Protection Regulation Influenced the Data Protection Rights of Canadian Citizens? R Mahieu, H Asghari, C Parsons, J van Hoboken, M Crete-Nishihata, ... Journal of Information Policy 11, 301-349, 2021 | 17 | 2021 |
Unravelling the Economic and Political Drivers of Deep Packet Inspection H Asghari, M van Eeten, M Mueller | 17 | 2012 |
Botnet mitigation and the role of ISPs: A quantitative study into the role and incentives of Internet Service Providers in combating botnet propagation and activity H Asghari Delft University of Technology., 2010 | 17 | 2010 |
Estimating the size of the iceberg from its tip: An investigation into unreported data breach notifications F Bisogni, H Asghari, M van Eeten 16th Annual Workshop on the Economics of Information Security, 54, 2017 | 16* | 2017 |
pyasn–Python IP address to autonomous system number lookup module H Asghari URL: https://github. com/hadiasghari/pyasn, 0 | 16 | |
Dimensioning the Elephant: An Empirical Analysis of the Ipv4 Transfer Market M Mueller, B Kuerbis, H Asghari Available at SSRN 2016483, 2012 | 15* | 2012 |