Maciej Korczyński
Maciej Korczyński
Grenoble University - Grenoble INP Ensimag
Verified email at univ-grenoble-alpes.fr - Homepage
TitleCited byYear
Markov chain fingerprinting to classify encrypted traffic
M Korczyński, A Duda
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 781-789, 2014
652014
Classifying service flows in the encrypted skype traffic
M Korczyński, A Duda
2012 IEEE International Conference on Communications (ICC), 1064-1068, 2012
302012
Who gets the boot? analyzing victimization by ddos-as-a-service
A Noroozian, M Korczyński, CH Gañan, D Makita, K Yoshioka, ...
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2016
232016
An accurate sampling scheme for detecting SYN flooding attacks and portscans
M Korczynski, L Janowski, A Duda
2011 IEEE International Conference on Communications (ICC), 1-5, 2011
222011
No domain left behind: is Let's Encrypt democratizing encryption?
M Aertsen, M Korczyński, G Moura, S Tajalizadehkhoob, J van den Berg
Proceedings of the Applied Networking Research Workshop, 48-54, 2017
212017
Developing security reputation metrics for hosting providers
A Noroozian, M Korczynski, S Tajalizadehkhoob, M van Eeten
8th Workshop on Cyber Security Experimentation and Test ({CSET} 15), 2015
192015
Tranco: A research-oriented top sites ranking hardened against manipulation
VL Pochat, T Van Goethem, S Tajalizadehkhoob, M Korczyński, W Joosen
Proceedings of the 26th Network and Distributed System Security Symposium …, 2018
182018
Apples, Oranges and Hosting Providers: Heterogeneity and Security in the Hosting Market
S Tajalizadehkhoob, M Korczynski, A Noroozian, C Ganán, M van Eeten
IEEE/IFIP Network Operations and Management Symposium (NOMS 2016 ), 2016
182016
Hive oversight for network intrusion early warning using diamond: a bee-inspired method for fully distributed cyber defense
M Korczynski, A Hamieh, JH Huh, H Holm, SR Rajagopalan, ...
IEEE Communications Magazine 54 (6), 60-67, 2016
172016
Make notifications great again: learning how to notify in the age of large-scale vulnerability scanning
O Cetin, C Ganan, M Korczynski, M van Eeten
Workshop on the Economy of Information Security, 2017
142017
Herding vulnerable cats: a statistical approach to disentangle joint responsibility for web security in shared hosting
S Tajalizadehkhoob, T Van Goethem, M Korczyński, A Noroozian, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
112017
Zone poisoning: The how and where of non-secure DNS dynamic updates
M Korczyński, M Król, M van Eeten
Proceedings of the 2016 Internet Measurement Conference, 271-278, 2016
102016
Reputation metrics design to improve intermediary incentives for security of tlds
M Korczynski, S Tajalizadehkhoob, A Noroozian, M Wullink, C Hesselman, ...
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 579-594, 2017
92017
Rotten Apples or bad harvest? What we are measuring when we are measuring abuse
S Tajalizadehkhoob, R Böhme, C Ganán, M Korczyński, MV Eeten
ACM Transactions on Internet Technology (TOIT) 18 (4), 49, 2018
82018
Cybercrime after the sunrise: A statistical analysis of dns abuse in new gtlds
M Korczynski, M Wullink, S Tajalizadehkhoob, G Moura, A Noroozian, ...
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
82018
Using loops observed in traceroute to infer the ability to spoof
Q Lone, M Luckie, M Korczyński, M van Eeten
International Conference on Passive and Active Network Measurement, 229-241, 2017
82017
Classifying Application Flows and Intrusion Detection in Internet Traffic
M Korczynski, A Duda
Ecole Doctorale Mathema-tiques, Sciences et Technologies de l'Information …, 2012
82012
Clusters in the expanse: Understanding and unbiasing IPv6 hitlists
O Gasser, Q Scheitle, P Foremski, Q Lone, M Korczyński, SD Strowes, ...
Proceedings of the Internet Measurement Conference 2018, 364-378, 2018
72018
DIAMoND: Distributed Intrusion/Anomaly Monitoring for Nonparametric Detection
M Korczynski, A Hamieh, JH Huh, H Holm, SR Rajagopalan, ...
The 24th International Conference on Computer Communications and Networks …, 2015
62015
In Log We Trust: Revealing Poor Security Practices with Certificate Transparency Logs and Internet Measurements
O Gasser, B Hof, M Helm, M Korczynski, R Holz, G Carle
International Conference on Passive and Active Network Measurement, 173-185, 2018
52018
The system can't perform the operation now. Try again later.
Articles 1–20