In this paper, we revisit the use of honeypots for detecting reflective
...
In this paper, we revisit the performance of the QUIC connection setup a...
In this paper, we study the potentials of passive measurements to gain
a...
The critical remote-code-execution (RCE) Log4Shell is a severe vulnerabi...
Large-scale Internet scans are a common method to identify victims of a
...
In this paper, we present first measurements of Internet background radi...
IP spoofing enables reflection and amplification attacks, which cause ma...
The message-driven nature of actors lays a foundation for developing sca...