Остановите войну!
for scientists:
default search action
Anna Sperotto
- > Home > Persons > Anna Sperotto
Publications
- 2024
- [c71]Ramin Yazdani, Mattijs Jonker, Anna Sperotto:
Swamp of Reflectors: Investigating the Ecosystem of Open DNS Resolvers. PAM (2) 2024: 3-18 - 2023
- [c68]Ramin Yazdani, Yevheniya Nosyk, Ralph Holz, Maciej Korczynski, Mattijs Jonker, Anna Sperotto:
Hazardous Echoes: The DNS Resolvers that Should Be Put on Mute. TMA 2023: 1-10 - 2022
- [c67]Olivier van der Toorn, Roland van Rijswijk-Deij, Raffaele Sommese, Anna Sperotto, Mattijs Jonker:
Saving Brian's privacy: the perils of privacy exposure through reverse DNS. IMC 2022: 1-13 - [c66]Raffaele Sommese, kc claffy, Roland van Rijswijk-Deij, Arnab Chattopadhyay, Alberto Dainotti, Anna Sperotto, Mattijs Jonker:
Investigating the impact of DDoS attacks on DNS infrastructure. IMC 2022: 51-64 - [c64]Ramin Yazdani, Roland van Rijswijk-Deij, Mattijs Jonker, Anna Sperotto:
A Matter of Degree: Characterizing the Amplification Power of Open DNS Resolvers. PAM 2022: 293-318 - [c63]Ramin Yazdani, Alden Hilton, Jeroen van der Ham, Roland van Rijswijk-Deij, Casey T. Deccio, Anna Sperotto, Mattijs Jonker:
Mirrors in the Sky: On the Potential of Clouds in DNS Reflection-based Denial-of-Service Attacks. RAID 2022: 263-275 - [i1]Olivier van der Toorn, Raffaele Sommese, Anna Sperotto, Roland van Rijswijk-Deij, Mattijs Jonker:
Saving Brian's Privacy: the Perils of Privacy Exposure through Reverse DNS. CoRR abs/2202.01160 (2022) - 2021
- [c62]Olivier van der Toorn, Johannes Krupp, Mattijs Jonker, Roland van Rijswijk-Deij, Christian Rossow, Anna Sperotto:
ANYway: Measuring the Amplification DDoS Potential of Domains. CNSM 2021: 500-508 - [c61]Raffaele Sommese, Gautam Akiwate, Mattijs Jonker, Giovane C. M. Moura, Marco Davids, Roland van Rijswijk-Deij, Geoffrey M. Voelker, Stefan Savage, Kimberly C. Claffy, Anna Sperotto:
Characterization of Anycast Adoption in the DNS Authoritative Infrastructure. TMA 2021 - 2020
- [j20]Cristian Hesselman, Paola Grosso, Ralph Holz, Fernando Kuipers, Janet Hui Xue, Mattijs Jonker, Joeri de Ruiter, Anna Sperotto, Roland van Rijswijk-Deij, Giovane C. M. Moura, Aiko Pras, Cees de Laat:
A Responsible Internet to Increase Trust in the Digital World. J. Netw. Syst. Manag. 28(4): 882-922 (2020) - [c60]Raffaele Sommese, Mattijs Jonker, Roland van Rijswijk-Deij, Alberto Dainotti, Kimberly C. Claffy, Anna Sperotto:
The Forgotten Side of DNS: Orphan and Abandoned Records. EuroS&P Workshops 2020: 538-543 - [c57]Raffaele Sommese, Leandro Marcio Bertholdo, Gautam Akiwate, Mattijs Jonker, Roland van Rijswijk-Deij, Alberto Dainotti, kc claffy, Anna Sperotto:
MAnycast2: Using Anycast to Measure Anycast. Internet Measurement Conference 2020: 456-463 - [c55]Mattijs Jonker, Anna Sperotto, Aiko Pras:
DDoS Mitigation: A Measurement-Based Approach. NOMS 2020: 1-6 - [c53]Raffaele Sommese, Giovane C. M. Moura, Mattijs Jonker, Roland van Rijswijk-Deij, Alberto Dainotti, Kimberly C. Claffy, Anna Sperotto:
When Parents and Children Disagree: Diving into DNS Delegation Inconsistency. PAM 2020: 175-189 - 2018
- [c51]Mattijs Jonker, Aiko Pras, Alberto Dainotti, Anna Sperotto:
A First Joint Look at DoS Attacks and BGP Blackholing in the Wild. Internet Measurement Conference 2018: 457-463 - 2017
- [j17]Rick Hofstede, Mattijs Jonker, Anna Sperotto, Aiko Pras:
Flow-Based Web Application Brute-Force Attack and Compromise Detection. J. Netw. Syst. Manag. 25(4): 735-758 (2017) - [c47]Mattijs Jonker, Anna Sperotto:
Measuring exposure in DDoS protection services. CNSM 2017: 1-9 - [c46]Mattijs Jonker, Alistair King, Johannes Krupp, Christian Rossow, Anna Sperotto, Alberto Dainotti:
Millions of targets under attack: a macroscopic characterization of the DoS ecosystem. Internet Measurement Conference 2017: 100-113 - 2016
- [j15]Roland van Rijswijk-Deij, Mattijs Jonker, Anna Sperotto, Aiko Pras:
A High-Performance, Scalable Infrastructure for Large-Scale Active DNS Measurements. IEEE J. Sel. Areas Commun. 34(6): 1877-1888 (2016) - [c41]Roland van Rijswijk-Deij, Mattijs Jonker, Anna Sperotto:
On the adoption of the elliptic curve digital signature algorithm (ECDSA) in DNSSEC. CNSM 2016: 258-262 - [c40]Mattijs Jonker, Anna Sperotto, Roland van Rijswijk-Deij, Ramin Sadre, Aiko Pras:
Measuring the Adoption of DDoS Protection Services. Internet Measurement Conference 2016: 279-285 - 2015
- [c36]Mattijs Jonker, Anna Sperotto:
Mitigating DDoS Attacks Using OpenFlow-Based Software Defined Networking. AIMS 2015: 129-133 - [c32]Mattijs Jonker, Rick Hofstede, Anna Sperotto, Aiko Pras:
Unveiling flat traffic on the Internet: An SSH attack case study. IM 2015: 270-278 - [c30]Olivier van der Toorn, Rick Hofstede, Mattijs Jonker, Anna Sperotto:
A first look at HTTP(S) intrusion detection using NetFlow/IPFIX. IM 2015: 862-865 - [c27]Roland van Rijswijk-Deij, Mattijs Jonker, Anna Sperotto, Aiko Pras:
The Internet of Names: A DNS Big Dataset. SIGCOMM 2015: 91-92
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 23:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint