Author:
Fernandez Simon,Hureau Olivier,Duda Andrzej,Korczynski Maciej
Publisher
Springer Nature Switzerland
Reference38 articles.
1. Affinito, A., et al.: Domain name lifetimes: baseline and threats. In: 6th Network Traffic Measurement and Analysis Conference, TMA 2022. IFIP (2022). https://dl.ifip.org/db/conf/tma/tma2022/tma2022-paper32.pdf
2. Bianzino, A.P., Pezzuolo, D., Mazzini, G.: Who is whois? An analysis of results consistence. In: 2014 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM), pp. 289–292. IEEE (2014). https://doi.org/10.1109/SOFTCOM.2014.7039137
3. Blanchet, M.: Finding the Authoritative Registration Data Access Protocol (RDAP) Service. Request for Comments RFC 9224, Internet Engineering Task Force (2022). https://doi.org/10.17487/RFC9224
4. Çetin, O., Hanif Jhaveri, M., Gañán, C., van Eeten, M., Moore, T.: Understanding the role of sender reputation in abuse reporting and cleanup. J. Cybersecur. 2(1), 83–98 (2016). https://doi.org/10.1093/cybsec/tyw005
5. Christin, N., Yanagihara, S.S., Kamataki, K.: Dissecting one click frauds. In: Proceedings of the 17th ACM Conference on Computer and Communications Security - CCS 2010, p. 15. ACM Press (2010). https://doi.org/10.1145/1866307.1866310
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Are You Sure You Want To Do Coordinated Vulnerability Disclosure?;2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW);2024-07-08