1. 2018
  2. Using Crowdsourcing Marketplaces for Network Measurements: The Case of Spoofer

    Lone, Q., Luckie, M., Korczyński, M., Asghari, H., Javed, M. & Van Eeten, M., 2018, TMA 2018 - Proceedings of the 2nd Network Traffic Measurement and Analysis Conference. Casas, P. (ed.). Institute of Electrical and Electronics Engineers Inc., 8 p. 8506499

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  3. 2017
  4. Using loops observed in traceroute to infer the ability to spoof

    Lone, Q., Luckie, M., Korczyński, M. & Van Eeten, M., 2017, Passive and Active Measurement - 18th International Conference, PAM 2017, Proceedings. Uhlig, S., Amann, J. & Kaafar, M. A. (eds.). Springer Verlag, p. 229-241 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10176 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  5. 2016
  6. Evaluating the Impact of AbuseHUB on Botnet Mitigation

    van Eeten, M., Lone, Q., Moreira Moura, G., Asghari, H. & Korczynski, M., 2016, Cornell University Library - arXiv.org. 64 p.

    Research output: Book/ReportReportScientific

  7. 2015
  8. How dynamic is the ISPs address space? Towards internet-wide DHCP churn estimation

    Moura, GCM., Ganan, C., Lone, QB., Poursaied Esfahani, P., Asghari, H. & van Eeten, MJG., 2015, Proceedings of the 14th IFIP Networking Conference. Kacimi, R. & Mammeri, Z. (eds.). Piscataway, NJ, USA: IEEE Society, p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

ID: 208602