Follow
Maciej Korczyński
Maciej Korczyński
Professor, Grenoble Alpes University - Grenoble INP Ensimag
Verified email at univ-grenoble-alpes.fr - Homepage
Title
Cited by
Cited by
Year
Tranco: A research-oriented top sites ranking hardened against manipulation
VL Pochat, T Van Goethem, S Tajalizadehkhoob, M Korczyński, W Joosen
Proceedings of the 26th Network and Distributed System Security Symposium …, 2019
7402019
Markov chain fingerprinting to classify encrypted traffic
M Korczyński, A Duda
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 781-789, 2014
2022014
Clusters in the expanse: Understanding and unbiasing IPv6 hitlists
O Gasser, Q Scheitle, P Foremski, Q Lone, M Korczyński, SD Strowes, ...
Proceedings of the Internet Measurement Conference 2018, 364-378, 2018
1512018
Make notifications great again: learning how to notify in the age of large-scale vulnerability scanning
FO Çetin, C Ganan, M Korczynski, M Van Eeten
WEIS 2017, 1-23, 2017
702017
In log we trust: Revealing poor security practices with certificate transparency logs and internet measurements
O Gasser, B Hof, M Helm, M Korczynski, R Holz, G Carle
Passive and Active Measurement: 19th International Conference, PAM 2018 …, 2018
63*2018
Cybercrime after the sunrise: A statistical analysis of DNS abuse in new gTLDs
M Korczynski, M Wullink, S Tajalizadehkhoob, GCM Moura, A Noroozian, ...
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
602018
Who gets the boot? analyzing victimization by ddos-as-a-service
A Noroozian, M Korczyński, CH Gañan, D Makita, K Yoshioka, ...
Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016
542016
Herding vulnerable cats: a statistical approach to disentangle joint responsibility for web security in shared hosting
S Tajalizadehkhoob, T Van Goethem, M Korczyński, A Noroozian, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
512017
No domain left behind: is Let's Encrypt democratizing encryption?
M Aertsen, M Korczyński, GCM Moura, S Tajalizadehkhoob, ...
Proceedings of the applied networking research workshop, 48-54, 2017
492017
COMAR: Classification of Compromised versus Maliciously Registered Domains
S Maroofi, M Korczynski, C Hesselman, B Ampeau, A Duda
IEEE European Symposium on Security and Privacy, 2020
462020
Classifying service flows in the encrypted skype traffic
M Korczyński, A Duda
2012 IEEE International Conference on Communications (ICC), 1064-1068, 2012
432012
Using loops observed in traceroute to infer the ability to spoof
Q Lone, M Luckie, M Korczyński, M Van Eeten
Passive and Active Measurement: 18th International Conference, PAM 2017 …, 2017
412017
Hive oversight for network intrusion early warning using DIAMoND: a bee-inspired method for fully distributed cyber defense
M Korczynski, A Hamieh, JH Huh, H Holm, SR Rajagopalan, ...
IEEE Communications Magazine 54 (6), 60-67, 2016
412016
Apples, Oranges and Hosting Providers: Heterogeneity and Security in the Hosting Market
S Tajalizadehkhoob, M Korczynski, A Noroozian, C Ganán, M van Eeten
IEEE/IFIP Network Operations and Management Symposium (NOMS 2016 ), 2016
352016
Zone poisoning: The how and where of non-secure DNS dynamic updates
M Korczyński, M Król, M Van Eeten
Proceedings of the 2016 Internet Measurement Conference, 271-278, 2016
332016
Reputation metrics design to improve intermediary incentives for security of TLDs
M Korczynski, S Tajalizadehkhoob, A Noroozian, M Wullink, C Hesselman, ...
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 579-594, 2017
322017
Developing security reputation metrics for hosting providers
A Noroozian, M Korczynski, S Tajalizadehkhoob, M van Eeten
8th Workshop on Cyber Security Experimentation and Test (CSET 15), 2015
312015
Don't Forget to Lock the Front Door! Inferring the Deployment of Source Address Validation of Inbound Traffic
M Korczyński, Y Nosyk, Q Lone, M Skwarek, B Jonglez, A Duda
International Conference on Passive and Active Network Measurement, 2020
302020
Adoption of email anti-spoofing schemes: a large scale analysis
S Maroofi, M Korczyński, A Hölzel, A Duda
IEEE Transactions on Network and Service Management 18 (3), 3184-3196, 2021
292021
An accurate sampling scheme for detecting SYN flooding attacks and portscans
M Korczynski, L Janowski, A Duda
2011 IEEE International Conference on Communications (ICC), 1-5, 2011
282011
The system can't perform the operation now. Try again later.
Articles 1–20