In this paper, we revisit the use of honeypots for detecting reflective
...
In this paper, we revisit the performance of the QUIC connection setup a...
In this paper, we study the potentials of passive measurements to gain
a...
In this paper, we present the design, implementation, and analysis of DN...
The critical remote-code-execution (RCE) Log4Shell is a severe vulnerabi...
Large-scale Internet scans are a common method to identify victims of a
...
In this paper, we revisit the open DNS (ODNS) infrastructure and, for th...
In this paper, we present first measurements of Internet background radi...
In this paper, we shed new light on the DNS amplification ecosystem, by
...
Industrial control systems (ICS) are managed remotely with the help of
d...