• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
20082020

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2020

    A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web

    Holz, R., Perino, D., Varvello, M., Amann, J., Continella, A., Evans, N., Leontiadis, I., Natoli, C. & Scheitle, Q., 1 Jun 2020, Proceedings of the Network Traffic Measurement and Analysis Conference (TMA). IEEE, 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Downloads (Pure)
  • On the origin of scanning: the impact of location on Internet-wide scans

    Wan, G., Izhikevich, L., Adrian, D., Yoshioka, K., Holz, R., Rossow, C. & Durumeric, Z., Oct 2020, IMC '20: Proceedings of the ACM Internet Measurement Conference. ACM SIGCOMM, p. 661-679

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Triplet Mining-based Phishing Webpage Detection

    Abeywardena, K., Zhao, J., Brent, L., Seneviratne, S. & Holz, R-G., 11 Nov 2020, Local Computer Networks. Sydney, Australia: IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • 2017

    On availability for blockchain-based systems

    Weber, I., Gramoli, V., Ponomarev, A., Staples, M., Holz, R., Tran, A. B. & Rimba, P., 2017, 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS). Piscataway, NJ: IEEE, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    59 Citations (Scopus)
  • 2016

    Endpoint-transparent Multipath Transport with Software-defined Networks

    Banfi, D., Mehani, O., Jourjon, G., Schwaighofer, L. & Holz, R., 2016, Proceedings 2016 IEEE 41st Conference on Local Computer Networks (LCN): November 7-10, 2016, Dubai, United Arab Emirates. Piscataway, NJ: IEEE, p. 307-315 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    9 Citations (Scopus)
  • TLS in the wild: An Internet-wide analysis of TLS-based protocols for electronic communication

    Holz, R., Amann, J., Mehani, O., Wachs, M. & Ali Kaafar, M., 2016, Network and Distributed System Security Symposium 2016. Internet Society, 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
  • 2015

    An Early Look at Multipath TCP Deployment in the Wild

    Mehani, O., Holz, R-G., Ferlin, S. & Boreli, R., 2015, HotPlanet '15: Proceedings of the 6th International Workshop on Hot Topics in Planet-Scale Measurement. Hui, P., Ben Abdesslem, F. & Rao, W. (eds.). Association for Computing Machinery (ACM), p. 7–12

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    8 Citations (Scopus)
  • Investigating the Nature of Routing Anomalies: Closing in on Subprefix Hijacking Attacks

    Schlamp, J., Holz, R., Gasser, O., Korsten, A., Jacquemart, Q., Carle, G. & Biersack, E. W., 2015, Traffic Monitoring and Analysis: 7th International Workshop, TMA 2015, Barcelona, Spain, April 21-24, 2015. Proceedings. Steiner, M., Barlet-Ros, P. & Bonaventure, O. (eds.). Cham: Springer, p. 173-187 (Lecture Notes in Computer Science; vol. 9053)(Computer Communication Networks and Telecommunications).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    3 Citations (Scopus)
  • Securing a deployment pipeline

    Bass, L., Holz, R., Rimba, P., Tran, A. B. & Zhu, L., 2015, 2015 IEEE/ACM 3rd International Workshop on Release Engineering. Piscataway, NJ: IEEE, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    16 Citations (Scopus)
    13 Downloads (Pure)
  • 2014

    A deeper understanding of SSH: results from Internet-wide scans

    Gasser, O., Holz, R. & Carle, G., 2014, 2014 IEEE Network Operations and Management Symposium (NOMS). Piscataway, NJ: IEEE, 9 p. (IEEE Network Operations and Management Symposium (NOMS); vol. 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    9 Citations (Scopus)
  • 2012

    X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-middle

    Holz, R., Riedmaier, T., Kammenhuber, N. & Carle, G., 2012, Computer Security – ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings. Foresti, S., Yung, M. & Martinelli, F. (eds.). Berlin, Heidelberg: Springer, p. 217-234 (Lecture Notes in Computer Science; vol. 7459).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    21 Citations (Scopus)
  • 2011

    Investigating the OpenPGP Web of Trust

    Ulrich, A., Holz, R., Hauck, P. & Carle, G., 2011, Computer Security – ESORICS 2011: 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings. Atluri, V. & Diaz, C. (eds.). Berlin, Heidelberg: Springer, p. 489-507 (Lecture Notes in Computer Science; vol. 6879).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    13 Citations (Scopus)
  • The SSL Landscape - A Thorough Analysis of the X.509 PKI Using Active and Passive Measurements

    Holz, R., Braun, L., Kammenhuber, N. & Carle, G. J., 2011, IMC '11: Proceedings of the 2011 ACM SIGCOMM Internet Measurement Conference. Thiran, P. & Willinger, W. (eds.). Association for Computing Machinery (ACM), p. 427–444

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    109 Citations (Scopus)
  • 2010

    Pr2-P2PSIP: Privacy Preserving P2P Signaling for VoIP and IM

    Fessi, A., Evans, N. S., Niedermayer, H. & Holz, R., 2010, IPTComm '10: Proceedings of IPTComm 2010, Principles, Systems and Applications of IP Telecommunications. Carle, G., Reiser, H., Camarillo, G. & Gurbani, V. K. (eds.). Association for Computing Machinery (ACM), p. 134–145

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    8 Citations (Scopus)
  • 2009

    CLIO — A Cross-Layer Information Service for Overlay Network Optimization

    Haage, D., Holz, R-G., Niedermayer, H. & Laskov, P., 2009, Kommunikation in Verteilten Systemen (KiVS): 16. Fachtagung Kommunikation in Verteilten Systemen (KiVS 2009) Kassel, 2.–6. März 2009. David, K. & Geihs, K. (eds.). Berlin, Heidelberg: Springer, p. 279-284

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
  • On Using Home Networks and Cloud Computing for a Future Internet of Things

    Niedermayer, H., Holz, R., Pahl, M-O. & Carle, G., 2009, Future Internet - FIS 2009: Second Future Internet Symposium, FIS 2009, Berlin, Germany, September 1-3, 2009. Zseby, T., Savola, R. & Pistore, M. (eds.). Berlin, Heidelberg: Springer, 70 p. (Lecture Notes in Computer Science; vol. 6152).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    5 Citations (Scopus)
  • 2008

    Trust-rated Authentication for Domain-Structured Distributed Systems

    Holz, R-G., Niedermayer, H., Hauck, P. & Carle, G., 2008, Public Key Infrastructure: 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008, Proceedings. Mjølsnes, S. F., Mauw, S. & Katsikas, S. K. (eds.). Berlin, Heidelberg: Springer, p. 74-88

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)