Calculated based on number of publications stored in Pure and citations from Scopus
20082025

Research activity per year

Filter
Conference contribution

Search results

  • 2025

    Web Crawl Refusals: Insights From Common Crawl

    Ansar, M., Sperotto, A. & Holz, R., 7 Mar 2025, Passive and Active Measurement: 26th International Conference, PAM 2025, Virtual Event, March 10–12, 2025, Proceedings. Testart, C., van Rijswijk-Deij, R. & Stiller, B. (eds.). Cham: Springer, p. 197–214 (Lecture Notes in Computer Science; vol. 15567).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • 2024

    Assessing the security of Internet paths: A case study of Dutch critical infrastructures

    Khadka, S. K., Bayhan, S., Holz, R. & Hesselman, C. E. W., 23 Jul 2024, ANRW 2024 - Proceedings of the 2024 Applied Networking Research Workshop. Association for Computing Machinery, p. 67-73 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    123 Downloads (Pure)
  • Boosting Communication Efficiency of Federated Learning's Secure Aggregation

    Nazemi, N., Tavallaie, O., Chen, S., Zomaya, A. Y. & Holz, R., 29 Aug 2024, 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2024. IEEE, p. 157-158 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Is a Name Enough? A First Look into Detecting Clouds Using DNS Pointer Records

    Tarahomi, S., Sommese, R., de Boer, P.-T., Linssen, J., Holz, R. & Sperotto, A., 31 Dec 2024, 2024 20th International Conference on Network and Service Management (CNSM). IEEE Advancing Technology for Humanity, p. 1-5 5 p. 10814277

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • LanDscAPe: Exploring LDAP Weaknesses and Data Leaks at Internet Scale

    Kaspereit, J., Öndarö, G., Cesar, G. L., Ebbers, S., Ising, F., Saatjohann, C., Jonker, M., Holz, R. & Schinzel, S., 2024, Proceedings of the 33rd USENIX Security Symposium. USENIX Association, p. 1225-1242 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    7 Downloads (Pure)
  • PerFail 2024: Third International Workshop on Negative Results in Pervasive Computing - Welcome and Committees

    Peltonen, E., Mohan, N., Zdankin, P., Josten, M., Shreedar, T., Shreedhar, T., Bayhan, S., Berrocal, J., Chakraborty, S., Crowcroft, J., Ding, A. Y., Ferlin, S., Gasser, O., Holz, R. G., Kangasharju, J., Kolcun, R., Nicklas, D., Ott, J., Schiele, G. & Sigg, S. & 3 others, Solmaz, G., Eleni, E. & Weis, T., 23 Apr 2024, 2024 IEEE International Conference on Pervasive Computing and Communications: Workshops and other Affiliated Events (PerCom Workshops). IEEE, p. 38-39 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Towards Security Transparency of Autonomous Systems on the Internet

    Khadka, S. K., Holz, R. & Hesselman, C., 12 Mar 2024, Computer Security. ESORICS 2023 International Workshops: CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II. Katsikas, S., Abie, H., Ranise, S., Verderame, L., Cambiaso, E., Ugarelli, R., Praça, I., Li, W., Meng, W., Furnell, S., Katt, B., Pirbhulal, S., Shukla, A., Ianni, M., Dalla Preda, M., Choo, K.-K. R., Pupo Correia, M., Abhishta, A., Sileno, G., Alishahi, M., Kalutarage, H. & Yanai, N. (eds.). Cham: Springer, p. 510-513 4 p. (Lecture Notes in Computer Science; vol. 14399).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    51 Downloads (Pure)
  • 2023

    Hazardous Echoes: The DNS Resolvers that Should Be Put on Mute

    Yazdani, R., Nosyk, Y., Holz, R., Korczyński, M., Jonker, M. & Sperotto, A., 26 Jun 2023, 2023 7th Network Traffic Measurement and Analysis Conference (TMA). Piscataway, NJ: IEEE, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    3 Citations (Scopus)
    89 Downloads (Pure)
  • Quantifying Security Risks in Cloud Infrastructures: A Data-driven Approach

    Tarahomi, S., Holz, R. & Sperotto, A., 13 Jul 2023, 2023 IEEE 9th International Conference on Network Softwarization (NetSoft). Bernardos, C. J., Marini, B., Rojas, E., Verdi, F. L., Zhu, Z., Oki, E. & Parzyjegla, H. (eds.). IEEE, 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    5 Citations (Scopus)
    128 Downloads (Pure)
  • 2022

    On the Asymmetry of Internet eXchange Points - Why Should IXPs and CDNs Care?

    Bertholdo, L., Ferreira, S. L. A., Ceron, J. M., Holz, R., Granville, L. Z. & van Rijswijk - Deij, R. M., 2 Nov 2022, 18th International Conference on Network and Service Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    328 Downloads (Pure)
  • 2021

    A message from the program chairs of TAURIN 2021

    Holz, R. & Abhishta, A., 2021, TAURIN 2021 - Proceedings of the 2021 ACM SIGCOMM Workshop on Technologies, Applications, and Uses of a Responsible Internet.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

    Open Access
    File
    88 Downloads (Pure)
  • 2020

    A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web

    Holz, R., Perino, D., Varvello, M., Amann, J., Continella, A., Evans, N., Leontiadis, I., Natoli, C. & Scheitle, Q., 1 Jun 2020, TMA Conference 2020: Proceedings of the 4th Network Traffic Measurement and Analysis Conference, Berlin, Germany, June 10-11, 2020. Dagstuhl, 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    41 Downloads (Pure)
  • On the origin of scanning: the impact of location on Internet-wide scans

    Wan, G., Izhikevich, L., Adrian, D., Yoshioka, K., Holz, R., Rossow, C. & Durumeric, Z., Oct 2020, IMC '20: Proceedings of the ACM Internet Measurement Conference. ACM SIGCOMM, p. 662-679 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    35 Citations (Scopus)
    405 Downloads (Pure)
  • Triplet Mining-based Phishing Webpage Detection

    Abeywardena, K., Zhao, J., Brent, L., Seneviratne, S. & Holz, R.-G., 11 Nov 2020, Local Computer Networks. Sydney, Australia: IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
  • 2017

    On availability for blockchain-based systems

    Weber, I., Gramoli, V., Ponomarev, A., Staples, M., Holz, R., Tran, A. B. & Rimba, P., 2017, 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS). Piscataway, NJ: IEEE, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    139 Citations (Scopus)
    160 Downloads (Pure)
  • 2016

    Endpoint-transparent Multipath Transport with Software-defined Networks

    Banfi, D., Mehani, O., Jourjon, G., Schwaighofer, L. & Holz, R., 2016, Proceedings 2016 IEEE 41st Conference on Local Computer Networks (LCN): November 7-10, 2016, Dubai, United Arab Emirates. Piscataway, NJ: IEEE, p. 307-315 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    12 Citations (Scopus)
    9 Downloads (Pure)
  • TLS in the wild: An Internet-wide analysis of TLS-based protocols for electronic communication

    Holz, R., Amann, J., Mehani, O., Wachs, M. & Ali Kaafar, M., 2016, Network and Distributed System Security Symposium 2016. Internet Society, 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    61 Citations (Scopus)
    360 Downloads (Pure)
  • 2015

    An Early Look at Multipath TCP Deployment in the Wild

    Mehani, O., Holz, R.-G., Ferlin, S. & Boreli, R., 2015, HotPlanet '15: Proceedings of the 6th International Workshop on Hot Topics in Planet-Scale Measurement. Hui, P., Ben Abdesslem, F. & Rao, W. (eds.). Association for Computing Machinery, p. 7–12

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    11 Citations (Scopus)
  • Investigating the Nature of Routing Anomalies: Closing in on Subprefix Hijacking Attacks

    Schlamp, J., Holz, R., Gasser, O., Korsten, A., Jacquemart, Q., Carle, G. & Biersack, E. W., 2015, Traffic Monitoring and Analysis: 7th International Workshop, TMA 2015, Barcelona, Spain, April 21-24, 2015. Proceedings. Steiner, M., Barlet-Ros, P. & Bonaventure, O. (eds.). Cham: Springer, p. 173-187 (Lecture Notes in Computer Science; vol. 9053)(Computer Communication Networks and Telecommunications).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    3 Citations (Scopus)
  • Securing a deployment pipeline

    Bass, L., Holz, R., Rimba, P., Tran, A. B. & Zhu, L., 2015, 2015 IEEE/ACM 3rd International Workshop on Release Engineering. Piscataway, NJ: IEEE, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    37 Citations (Scopus)
    210 Downloads (Pure)
  • 2014

    A deeper understanding of SSH: results from Internet-wide scans

    Gasser, O., Holz, R. & Carle, G., 2014, 2014 IEEE Network Operations and Management Symposium (NOMS). Piscataway, NJ: IEEE, 9 p. (IEEE Network Operations and Management Symposium (NOMS); vol. 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    21 Citations (Scopus)
  • 2012

    X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-middle

    Holz, R., Riedmaier, T., Kammenhuber, N. & Carle, G., 2012, Computer Security – ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings. Foresti, S., Yung, M. & Martinelli, F. (eds.). Berlin, Heidelberg: Springer, p. 217-234 (Lecture Notes in Computer Science; vol. 7459).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    33 Citations (Scopus)
  • 2011

    Investigating the OpenPGP Web of Trust

    Ulrich, A., Holz, R., Hauck, P. & Carle, G., 2011, Computer Security – ESORICS 2011: 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings. Atluri, V. & Diaz, C. (eds.). Berlin, Heidelberg: Springer, p. 489-507 (Lecture Notes in Computer Science; vol. 6879).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    30 Citations (Scopus)
  • The SSL Landscape - A Thorough Analysis of the X.509 PKI Using Active and Passive Measurements

    Holz, R., Braun, L., Kammenhuber, N. & Carle, G. J., 2011, IMC '11: Proceedings of the 2011 ACM SIGCOMM Internet Measurement Conference. Thiran, P. & Willinger, W. (eds.). Association for Computing Machinery, p. 427–444

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    154 Citations (Scopus)
  • 2010

    Pr2-P2PSIP: Privacy Preserving P2P Signaling for VoIP and IM

    Fessi, A., Evans, N. S., Niedermayer, H. & Holz, R., 2010, IPTComm '10: Proceedings of IPTComm 2010, Principles, Systems and Applications of IP Telecommunications. Carle, G., Reiser, H., Camarillo, G. & Gurbani, V. K. (eds.). Association for Computing Machinery, p. 134–145

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    8 Citations (Scopus)
  • 2009

    CLIO — A Cross-Layer Information Service for Overlay Network Optimization

    Haage, D., Holz, R.-G., Niedermayer, H. & Laskov, P., 2009, Kommunikation in Verteilten Systemen (KiVS): 16. Fachtagung Kommunikation in Verteilten Systemen (KiVS 2009) Kassel, 2.–6. März 2009. David, K. & Geihs, K. (eds.). Berlin, Heidelberg: Springer, p. 279-284

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
  • On Using Home Networks and Cloud Computing for a Future Internet of Things

    Niedermayer, H., Holz, R., Pahl, M.-O. & Carle, G., 2009, Future Internet - FIS 2009: Second Future Internet Symposium, FIS 2009, Berlin, Germany, September 1-3, 2009. Zseby, T., Savola, R. & Pistore, M. (eds.). Berlin, Heidelberg: Springer, 70 p. (Lecture Notes in Computer Science; vol. 6152).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    6 Citations (Scopus)
  • 2008

    Trust-rated Authentication for Domain-Structured Distributed Systems

    Holz, R.-G., Niedermayer, H., Hauck, P. & Carle, G., 2008, Public Key Infrastructure: 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008, Proceedings. Mjølsnes, S. F., Mauw, S. & Katsikas, S. K. (eds.). Berlin, Heidelberg: Springer, p. 74-88

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)