Holz, R., Perino, D., Varvello, M., Amann, J.
, Continella, A., Evans, N., Leontiadis, I., Natoli, C., & Scheitle, Q. (2020).
A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web. In
Proceedings of the Network Traffic Measurement and Analysis Conference (TMA) IEEE.
Meijerink, B.
, & Heijenk, G. (2020).
Infrastructure Support for Contention-Based Forwarding. In D. Cabric, O. Altintas, T. Leinmueller, H. Zhang, & T. Higuchi (Eds.),
2019 IEEE Vehicular Networking Conference, VNC 2019 [9062795] (IEEE Vehicular Networking Conference, VNC; Vol. 2019-December). IEEE Computer Society Press.
https://doi.org/10.1109/VNC48660.2019.9062795
Mohan, N., Corneo, L., Zavodovski , A.
, Bayhan, S., Wong, W., & Kangasharju, J. (2020).
Pruning Edge Research with Latency Shears. In B. Zhao, & H. Zheng (Eds.),
HotNets'20: The 19th ACM Workshop on Hot Topics in Networks (pp. 182-189). ACM Publishing.
https://dl.acm.org/doi/10.1145/3422604.3425943
Moura, G. C. M.
, Hesselman, C., Schaapman, G., Boerman, N., & De Weerdt, O. (2020).
Into the DDoS maelstrom: A longitudinal study of a scrubbing service. In
5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020 (pp. 550-558). [9229733] IEEE.
https://doi.org/10.1109/EuroSPW51379.2020.00081
Rodday, N. M., van Baaren, R.
, Hendriks, L.
, van Rijswijk - Deij, R. M.
, Pras, A., & Dreo Rodosek, G. (2020).
Evaluating RPKI ROV Identification Methodologies in Automatically Generated Mininet Topologies. In
Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies (CoNEXT '20) (pp. 530-531). ACM SIGCOMM.
https://doi.org/10.1145/3386367.3431669
Sommese, R.
, Bertholdo, L. M., Akiwate, G.
, Jonker, M.
, van Rijswijk - Deij, R. M., Dainotti, A., Claffy, K.
, & Sperotto, A. (2020).
MAnycast2 - Using Anycast to Measure Anycast: Challenges and Opportunities. In
IMC '20: Proceedings of the 20th ACM Internet Measurement Conference (pp. 456-463). ACM Publishing.
https://doi.org/10.1145/3419394.3423646
Sommese, R.
, Jonker, M.
, van Rijswijk-Deij, R., Dainotti, A., Claffy, K. C.
, & Sperotto, A. (2020).
The Forgotten Side of DNS: Orphan and Abandoned Records. In
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 538-543). [9229781] (Proceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020). IEEE.
https://doi.org/10.1109/EuroSPW51379.2020.00079
Sommese, R., Moura, G. C. M.
, Jonker, M.
, van Rijswijk-Deij, R., Dainotti, A., Claffy, K. C.
, & Sperotto, A. (2020).
When Parents and Children Disagree: Diving into DNS Delegation Inconsistency. In A. Sperotto, A. Dainotti, & B. Stiller (Eds.),
Passive and Active Measurement: 21st International Conference, PAM 2020, Eugene, Oregon, USA, March 30–31, 2020. Proceedings (pp. 175-189). (Lecture Notes in Computer Science; Vol. 12048). Springer Heidelberg.
https://doi.org/10.1007/978-3-030-44081-7_11
Wabeke, T., Moura, G. C. M., Franken, N.
, & Hesselman, C. (2020).
Counterfighting Counterfeit: Detecting and Taking down Fraudulent Webshops at a ccTLD. In A. Sperotto, A. Dainotti, & B. Stiller (Eds.),
Passive and Active Measurement - 21st International Conference, PAM 2020, Proceedings (pp. 158-174). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 12048 LNCS). Springer Singapore.
https://doi.org/10.1007/978-3-030-44081-7_10
Wan, G., Izhikevich, L., Adrian, D., Yoshioka, K.
, Holz, R., Rossow, C., & Durumeric, Z. (2020).
On the origin of scanning: the impact of location on Internet-wide scans. In
IMC '20: Proceedings of the ACM Internet Measurement Conference (pp. 661-679). ACM SIGCOMM.
https://doi.org/10.1145/3419394.3424214