Maciej Korczyński
Maciej Korczyński
Grenoble Alpes University - Grenoble INP Ensimag
Verified email at univ-grenoble-alpes.fr - Homepage
Title
Cited by
Cited by
Year
Markov chain fingerprinting to classify encrypted traffic
M Korczyński, A Duda
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 781-789, 2014
932014
Tranco: A research-oriented top sites ranking hardened against manipulation
VL Pochat, T Van Goethem, S Tajalizadehkhoob, M Korczyński, W Joosen
Proceedings of the 26th Network and Distributed System Security Symposium …, 2018
872018
Clusters in the expanse: Understanding and unbiasing IPv6 hitlists
O Gasser, Q Scheitle, P Foremski, Q Lone, M Korczyński, SD Strowes, ...
Proceedings of the Internet Measurement Conference 2018, 364-378, 2018
332018
No domain left behind: is Let's Encrypt democratizing encryption?
M Aertsen, M Korczyński, GCM Moura, S Tajalizadehkhoob, ...
Proceedings of the Applied Networking Research Workshop, 48-54, 2017
322017
Classifying service flows in the encrypted skype traffic
M Korczyński, A Duda
2012 IEEE International Conference on Communications (ICC), 1064-1068, 2012
312012
Who gets the boot? analyzing victimization by ddos-as-a-service
A Noroozian, M Korczyński, CH Gañan, D Makita, K Yoshioka, ...
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2016
292016
Make notifications great again: learning how to notify in the age of large-scale vulnerability scanning
O Cetin, C Ganan, M Korczynski, M van Eeten
Workshop on the Economy of Information Security, 2017
252017
Hive oversight for network intrusion early warning using DIAMoND: a bee-inspired method for fully distributed cyber defense
M Korczynski, A Hamieh, JH Huh, H Holm, SR Rajagopalan, ...
IEEE Communications Magazine 54 (6), 60-67, 2016
242016
An accurate sampling scheme for detecting SYN flooding attacks and portscans
M Korczynski, L Janowski, A Duda
2011 IEEE International Conference on Communications (ICC), 1-5, 2011
242011
Herding vulnerable cats: a statistical approach to disentangle joint responsibility for web security in shared hosting
S Tajalizadehkhoob, T Van Goethem, M Korczyński, A Noroozian, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
232017
Apples, Oranges and Hosting Providers: Heterogeneity and Security in the Hosting Market
S Tajalizadehkhoob, M Korczynski, A Noroozian, C Ganán, M van Eeten
IEEE/IFIP Network Operations and Management Symposium (NOMS 2016 ), 2016
222016
Cybercrime after the sunrise: A statistical analysis of DNS abuse in new gTLDs
M Korczynski, M Wullink, S Tajalizadehkhoob, GCM Moura, A Noroozian, ...
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
212018
Developing security reputation metrics for hosting providers
A Noroozian, M Korczynski, S Tajalizadehkhoob, M van Eeten
8th Workshop on Cyber Security Experimentation and Test ({CSET} 15), 2015
202015
Using loops observed in traceroute to infer the ability to spoof
Q Lone, M Luckie, M Korczyński, M van Eeten
International Conference on Passive and Active Network Measurement, 229-241, 2017
192017
Reputation metrics design to improve intermediary incentives for security of tlds
M Korczynski, S Tajalizadehkhoob, A Noroozian, M Wullink, C Hesselman, ...
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 579-594, 2017
182017
Zone poisoning: The how and where of non-secure DNS dynamic updates
M Korczyński, M Król, M van Eeten
Proceedings of the 2016 Internet Measurement Conference, 271-278, 2016
172016
In log we trust: revealing poor security practices with certificate transparency logs and internet measurements
O Gasser, B Hof, M Helm, M Korczynski, R Holz, G Carle
International Conference on Passive and Active Network Measurement, 173-185, 2018
152018
Using crowdsourcing marketplaces for network measurements: the case of Spoofer
Q Lone, M Luckie, M Korczyński, H Asghari, M Javed, M van Eeten
2018 Network Traffic Measurement and Analysis Conference (TMA), 1-8, 2018
112018
Rotten Apples or bad harvest? What we are measuring when we are measuring abuse
S Tajalizadehkhoob, R Böhme, C Ganán, M Korczyński, MV Eeten
ACM Transactions on Internet Technology (TOIT) 18 (4), 1-25, 2018
92018
Stopping amplified DNS DDoS attacks through distributed query rate sharing
S Verma, A Hamieh, JH Huh, H Holm, SR Rajagopalan, M Korczynski, ...
2016 11th International Conference on Availability, Reliability and Security …, 2016
92016
The system can't perform the operation now. Try again later.
Articles 1–20