108 results on '"Maciej Korczynski"'
Search Results
2. Stress Testing the DMARC Reporting System: Compliance with Standards and Ways of Improvement.
3. Zeros Are Heroes: NSEC3 Parameter Settings in the Wild.
4. Looking AT the Blue Skies of Bluesky.
5. Evaluating the Impact of Design Decisions on Passive DNS-Based Domain Rankings.
6. Shielding Brands: An In-Depth Analysis of Defensive Domain Registration Practices Against Cyber-Squatting.
7. WHOIS Right? An Analysis of WHOIS and RDAP Consistency.
8. Spoofed Emails: An Analysis of the Issues Hindering a Larger Deployment of DMARC.
9. Guardians of the Galaxy: Content Moderation in the InterPlanetary File System.
10. Unveiling the Weak Links: Exploring DNS Infrastructure Vulnerabilities and Fortifying Defenses.
11. Building a Resilient Domain Whitelist to Enhance Phishing Blacklist Accuracy.
12. Exploring the Dark Side of AI: Advanced Phishing Attack Design and Deployment Using ChatGPT.
13. Don't Get Hijacked: Prevalence, Mitigation, and Impact of Non-Secure DNS Dynamic Updates.
14. Guardians of DNS Integrity: A Remote Method for Identifying DNSSEC Validators Across the Internet.
15. Extended DNS Errors: Unlocking the Full Potential of DNS Troubleshooting.
16. The Cloud Strikes Back: Investigating the Decentralization of IPFS.
17. Hazardous Echoes: The DNS Resolvers that Should Be Put on Mute.
18. Intercept and Inject: DNS Response Manipulation in the Wild.
19. Operational Domain Name Classification: From Automatic Ground Truth Generation to Adaptation to Missing Values.
20. Guardians of DNS Integrity: A Remote Method for Identifying DNSSEC Validators Across the Internet.
21. Don't Get Hijacked: Prevalence, Mitigation, and Impact of Non-Secure DNS Dynamic Updates.
22. The Closed Resolver Project: Measuring the Deployment of Inbound Source Address Validation.
23. Deployment of Source Address Validation by Network Operators: A Randomized Control Trial.
24. Early Detection of Spam Domains with Passive DNS and SPF.
25. Routing Loops as Mega Amplifiers for DNS-Based DDoS Attacks.
26. Security Reputation Metrics.
27. Source Address Validation.
28. Semantic Identifiers and DNS Names for IoT.
29. Feasibility of Large-Scale Vulnerability Notifications after GDPR.
30. COMAR: Classification of Compromised versus Maliciously Registered Domains.
31. Are You Human?: Resilience of Phishing Detection to Evasion Techniques Based on Human Verification.
32. Don't Forget to Lock the Front Door! Inferring the Deployment of Source Address Validation of Inbound Traffic.
33. Adoption of Email Anti-Spoofing Schemes: A Large Scale Analysis.
34. Study on Domain Name System (DNS) Abuse: Technical Report.
35. Characterizing Vulnerability of DNS AXFR Transfers with Global-Scale Scanning.
36. MLSEC - Benchmarking Shallow and Deep Machine Learning Models for Network Security.
37. Inferring the Deployment of Inbound Source Address Validation Using DNS Resolvers.
38. Clusters in the Expanse: Understanding and Unbiasing IPv6 Hitlists.
39. Using Crowdsourcing Marketplaces for Network Measurements: The Case of Spoofer.
40. Cybercrime After the Sunrise: A Statistical Analysis of DNS Abuse in New gTLDs.
41. In Log We Trust: Revealing Poor Security Practices with Certificate Transparency Logs and Internet Measurements.
42. A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints.
43. From Defensive Registration to Subdomain Protection: Evaluation of Email Anti-Spoofing Schemes for High-Profile Domains.
44. Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs.
45. Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting.
46. No domain left behind: is Let's Encrypt democratizing encryption?
47. Using Loops Observed in Traceroute to Infer the Ability to Spoof.
48. Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation.
49. Rotten Apples or Bad Harvest? What We Are Measuring When We Are Measuring Abuse.
50. The Closed Resolver Project: Measuring the Deployment of Source Address Validation of Inbound Traffic.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.