Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 21 Similar Profiles
Intrusion detection Engineering & Materials Science
Internet Engineering & Materials Science
Monitoring Engineering & Materials Science
Internet service providers Engineering & Materials Science
HIgh speed networks Engineering & Materials Science
Websites Engineering & Materials Science
Servers Engineering & Materials Science
Scalability Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2007 2018

Flow-Based Compromise Detection: Lessons Learned

Hofstede, R., Pras, A., Sperotto, A. & Dreo Rodosek, G. Jan 2018 In : IEEE security & privacy. 16, 1, p. 82-89

Research output: Scientific - peer-reviewArticle

Data flow analysis
Scalability
data analysis
compromise
privacy

Booters and Certificates: An Overview of TLS in the DDoS-as-a-Service Landscape

Kuhnert, B., Steinberger, J., Baier, H., Sperotto, A. & Pras, A. 28 Jun 2017 ACCSE 2017: The Second International Conference on Advances in Computation, Communications and Services. Lorenz, P. & Trienekens, J. (eds.). IARIA/Thinkmind, p. 37 44 p.

Research output: Scientific - peer-reviewConference contribution

3 Citations

Challenges with Reproducibility

Bajpai, V., Kühlewind, M., Ott, J., Schoenwaelder, J., Sperotto, A. & Trammell, B. 2017 p. 1-4 4 p.

Research output: Scientific - peer-reviewPaper

Computer science
Cultural change

Improving DNS security: a measurement-based approach

van Rijswijk-Deij, R. 28 Jun 2017 Enschede. 227 p.

Research output: ScientificPhD Thesis - Research external, graduation UT

Security systems
Cryptography
Internet
Amplification

Measuring exposure in DDoS protection services

Jonker, M. & Sperotto, A. 30 Nov 2017 2017 13th International Conference on Network and Service Management (CNSM). IEEE, 9 p.

Research output: Scientific - peer-reviewConference contribution

Web sites
Attack
Outsourcing
Mitigation
Denial