Bortoluzzi et al., 2025
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Luckie et al. | Network hygiene, incentives, and regulation: deployment of source address validation in the internet | |
| US11297077B2 (en) | Gain customer trust with early engagement through visualization and data driven configuration | |
| US11025588B2 (en) | Identify assets of interest in enterprise using popularity as measure of importance | |
| US20200137021A1 (en) | Using intent to access in discovery protocols in a network for analytics | |
| US9860265B2 (en) | System and method for identifying exploitable weak points in a network | |
| US20200137094A1 (en) | Behavioral profiling of service access using intent to access in discovery protocols | |
| US11489853B2 (en) | Distributed threat sensor data aggregation and data export | |
| US20200137115A1 (en) | Smart and selective mirroring to enable seamless data collection for analytics | |
| Nappa et al. | Cyberprobe: Towards internet-scale active detection of malicious servers | |
| US12041094B2 (en) | Threat sensor deployment and management | |
| Khan et al. | A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing | |
| US10044736B1 (en) | Methods and apparatus for identifying and characterizing computer network infrastructure involved in malicious activity | |
| US10404738B2 (en) | IPFIX-based detection of amplification attacks on databases | |
| Pauley et al. | Measuring and mitigating the risk of ip reuse on public clouds | |
| Blumbergs et al. | Creating and detecting IPv6 transition mechanism-based information exfiltration covert channels | |
| Bortoluzzi et al. | Cloud telescope: A distributed architecture for capturing Internet background radiation | |
| Bortoluzzi et al. | Cloud Telescope: an ephemeral, distributed, cloud-native architecture for collecting Internet Background Radiation | |
| Li et al. | An empirical study of storj dcs: Ecosystem, performance, and security | |
| Lin et al. | A cloud-based forensics tracking scheme for online social network clients | |
| Wang et al. | Multifaceted analysis of malicious Ethereum accounts and corresponding activities | |
| Bortoluzzi et al. | Quantitative analysis of botnet activity within Internet background radiation as observed by a cloud telescope | |
| Qiu et al. | Before Toasters Rise Up: A View into the Emerging DoH Resolver's Deployment Risk | |
| Cunha Camargo et al. | Beyond Size: Investigating the Impact of Scaled‐Down Network Telescopes on Threat Detection | |
| O’Hara | Cloud-based network telescope for Internet background radiation collection | |
| Hynek | The Impact of Encrypted DNS on Network Security |