default search action
Harm Griffioen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c14]Harm Griffioen, Georgios Koursiounis, Georgios Smaragdakis, Christian Doerr:
Have you SYN me? Characterizing Ten Years of Internet Scanning. IMC 2024: 149-164 - 2023
- [c13]Daniel Wagner, Sahil Ashish Ranadive, Harm Griffioen, Michalis Kallitsis, Alberto Dainotti, Georgios Smaragdakis, Anja Feldmann:
How to Operate a Meta-Telescope in your Spare Time. IMC 2023: 328-343 - [c12]Harm Griffioen, Christian Doerr:
Could you clean up the Internet with a Pit of Tar? Investigating tarpit feasibility on Internet worms. SP 2023: 2551-2565 - 2021
- [c11]Tsuyoshi Taniguchi, Harm Griffioen, Christian Doerr:
Analysis and Takeover of the Bitcoin-Coordinated Pony Malware. AsiaCCS 2021: 916-930 - [c10]Harm Griffioen, Kris Oosthoek, Paul van der Knaap, Christian Doerr:
Scan, Test, Execute: Adversarial Tactics in Amplification DDoS Attacks. CCS 2021: 940-954 - [c9]Harm Griffioen, Huancheng Hu, Christian Doerr:
SIP Bruteforcing in the Wild - An Assessment of Adversaries, Techniques and Tools. Networking 2021: 1-9 - 2020
- [c8]Harm Griffioen, Christian Doerr:
Quantifying autonomous system IP churn using attack traffic of botnets. ARES 2020: 8:1-8:10 - [c7]Harm Griffioen, Tim M. Booij, Christian Doerr:
Quality Evaluation of Cyber Threat Intelligence Feeds. ACNS (2) 2020: 277-296 - [c6]Harm Griffioen, Christian Doerr:
Examining Mirai's Battle over the Internet of Things. CCS 2020: 743-756 - [c5]Harm Griffioen, Christian Doerr:
Quantifying TCP SYN DDoS Resilience: A Longitudinal Study of Internet Services. Networking 2020: 217-225 - [c4]Harm Griffioen, Christian Doerr:
Discovering Collaboration: Unveiling Slow, Distributed Scanners based on Common Header Field Patterns. NOMS 2020: 1-9 - [c3]Xander Bouwman, Harm Griffioen, Jelle Egbers, Christian Doerr, Bram Klievink, Michel van Eeten:
A different cup of TI? The added value of commercial threat intelligence. USENIX Security Symposium 2020: 433-450
2010 – 2019
- 2019
- [c2]Harm Griffioen, Christian Doerr:
Taxonomy and Adversarial Strategies of Random Subdomain Attacks. NTMS 2019: 1-5 - [c1]Vincent Ghiëtte, Harm Griffioen, Christian Doerr:
Fingerprinting Tooling used for SSH Compromisation Attempts. RAID 2019: 61-71
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint