Follow
Maciej Korczyński
Maciej Korczyński
Professor, Grenoble Alpes University - Grenoble INP Ensimag
Verified email at univ-grenoble-alpes.fr - Homepage
Title
Cited by
Cited by
Year
Tranco: A research-oriented top sites ranking hardened against manipulation
VL Pochat, T Van Goethem, S Tajalizadehkhoob, M Korczyński, W Joosen
Proceedings of the 26th Network and Distributed System Security Symposium …, 2019
7972019
Markov chain fingerprinting to classify encrypted traffic
M Korczyński, A Duda
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 781-789, 2014
2082014
Clusters in the expanse: Understanding and unbiasing IPv6 hitlists
O Gasser, Q Scheitle, P Foremski, Q Lone, M Korczyński, SD Strowes, ...
Proceedings of the Internet Measurement Conference 2018, 364-378, 2018
1612018
Make notifications great again: learning how to notify in the age of large-scale vulnerability scanning
FO Çetin, C Ganan, M Korczynski, M Van Eeten
WEIS 2017, 1-23, 2017
722017
In log we trust: Revealing poor security practices with certificate transparency logs and internet measurements
O Gasser, B Hof, M Helm, M Korczynski, R Holz, G Carle
Passive and Active Measurement: 19th International Conference, PAM 2018 …, 2018
67*2018
Cybercrime after the sunrise: A statistical analysis of DNS abuse in new gTLDs
M Korczynski, M Wullink, S Tajalizadehkhoob, GCM Moura, A Noroozian, ...
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
642018
Who gets the boot? analyzing victimization by ddos-as-a-service
A Noroozian, M Korczyński, CH Gañan, D Makita, K Yoshioka, ...
Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016
602016
Herding vulnerable cats: a statistical approach to disentangle joint responsibility for web security in shared hosting
S Tajalizadehkhoob, T Van Goethem, M Korczyński, A Noroozian, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
582017
COMAR: Classification of Compromised versus Maliciously Registered Domains
S Maroofi, M Korczynski, C Hesselman, B Ampeau, A Duda
IEEE European Symposium on Security and Privacy, 2020
542020
No domain left behind: is Let's Encrypt democratizing encryption?
M Aertsen, M Korczyński, GCM Moura, S Tajalizadehkhoob, ...
Proceedings of the applied networking research workshop, 48-54, 2017
512017
Using loops observed in traceroute to infer the ability to spoof
Q Lone, M Luckie, M Korczyński, M Van Eeten
Passive and Active Measurement: 18th International Conference, PAM 2017 …, 2017
432017
Classifying service flows in the encrypted skype traffic
M Korczyński, A Duda
2012 IEEE International Conference on Communications (ICC), 1064-1068, 2012
432012
Hive oversight for network intrusion early warning using DIAMoND: a bee-inspired method for fully distributed cyber defense
M Korczynski, A Hamieh, JH Huh, H Holm, SR Rajagopalan, ...
IEEE Communications Magazine 54 (6), 60-67, 2016
422016
Reputation metrics design to improve intermediary incentives for security of TLDs
M Korczynski, S Tajalizadehkhoob, A Noroozian, M Wullink, C Hesselman, ...
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 579-594, 2017
362017
Apples, Oranges and Hosting Providers: Heterogeneity and Security in the Hosting Market
S Tajalizadehkhoob, M Korczynski, A Noroozian, C Ganán, M van Eeten
IEEE/IFIP Network Operations and Management Symposium (NOMS 2016 ), 2016
362016
Zone poisoning: The how and where of non-secure DNS dynamic updates
M Korczyński, M Król, M Van Eeten
Proceedings of the 2016 Internet Measurement Conference, 271-278, 2016
352016
Adoption of email anti-spoofing schemes: a large scale analysis
S Maroofi, M Korczyński, A Hölzel, A Duda
IEEE Transactions on Network and Service Management 18 (3), 3184-3196, 2021
342021
Developing security reputation metrics for hosting providers
A Noroozian, M Korczynski, S Tajalizadehkhoob, M van Eeten
8th Workshop on Cyber Security Experimentation and Test (CSET 15), 2015
322015
Don't Forget to Lock the Front Door! Inferring the Deployment of Source Address Validation of Inbound Traffic
M Korczyński, Y Nosyk, Q Lone, M Skwarek, B Jonglez, A Duda
International Conference on Passive and Active Network Measurement, 2020
312020
An accurate sampling scheme for detecting SYN flooding attacks and portscans
M Korczynski, L Janowski, A Duda
2011 IEEE International Conference on Communications (ICC), 1-5, 2011
282011
The system can't perform the operation now. Try again later.
Articles 1–20