Search

Your search keyword '"Dainotti, Alberto"' showing total 194 results

Search Constraints

Start Over You searched for: Author "Dainotti, Alberto" Remove constraint Author: "Dainotti, Alberto"
194 results on '"Dainotti, Alberto"'

Search Results

1. Network topology facilitates internet traffic control in autocracies.

2. Aggressive Internet-Wide Scanners: Network Impact and Longitudinal Characterization

3. Towards Improving Outage Detection with Multiple Probing Protocols

5. Quantifying Nations Exposure to Traffic Observation and Selective Tampering

6. Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope

7. Improving the Inference of Sibling Autonomous Systems

9. Chocolatine: Outage Detection for Internet Background Radiation

10. Quantifying Nations’ Exposure to Traffic Observation and Selective Tampering

11. A Survey among Network Operators on BGP Prefix Hijacking

12. ARTEMIS: Neutralizing BGP Hijacking within a Minute

13. When Parents and Children Disagree: Diving into DNS Delegation Inconsistency

14. To Filter or Not to Filter: Measuring the Benefits of Registering in the RPKI Today

17. Lost in Space: Improving Inference of IPv4 Address Space Utilization

18. How to Find Correlated Internet Failures

25. How Dangerous Is Internet Scanning? : A Measurement Study of the Aftermath of an Internet-Wide Scan

27. iGDB

29. Reviewing Traffic Classification

30. Using a Behaviour Knowledge Space Approach for Detecting Unknown IP Traffic Flows

31. Early Classification of Network Traffic through Multi-classification

32. K-Dimensional Trees for Continuous Traffic Classification

33. TIE: A Community-Oriented Traffic Classification Platform

36. Attack or Block? Repertoires of Digital Censorship in Autocracies.

41. Untangling Header Bidding Lore: Some Myths, Some Truths, and Some Hope

42. A multi-perspective view of Internet censorship in Myanmar

43. Traffic analysis of peer-to-peer IPTV communities

44. Supplemental Material, Lutscher_etAl_Appendix - At Home and Abroad: The Use of Denial-of-service Attacks during Elections in Nondemocratic Regimes

45. Counterfighting Counterfeit: Detecting and Taking down Fraudulent Webshops at a ccTLD

46. Reviewing Traffic Classification

47. DynamIPs

48. AS-Path Prepending

49. MAnycast2

Catalog

Books, media, physical & digital resources