default search action
Maciej Korczynski
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c49]Leonhard Balduf, Saidu Sokoto, Onur Ascigil, Gareth Tyson, Björn Scheuermann, Maciej Korczynski, Ignacio Castro, Michal Król:
Looking AT the Blue Skies of Bluesky. IMC 2024: 76-91 - [c48]Cordian Alexander Daniluk, Yevheniya Nosyk, Andrzej Duda, Maciej Korczynski:
Zeros Are Heroes: NSEC3 Parameter Settings in the Wild. IMC 2024: 415-422 - [c47]Simon Fernandez, Olivier Hureau, Andrzej Duda, Maciej Korczynski:
WHOIS Right? An Analysis of WHOIS and RDAP Consistency. PAM (1) 2024: 206-231 - [c46]Olivier Hureau, Jan Bayer, Andrzej Duda, Maciej Korczynski:
Spoofed Emails: An Analysis of the Issues Hindering a Larger Deployment of DMARC. PAM (1) 2024: 232-261 - [c45]Ben Chukwuemeka Benjamin, Jan Bayer, Simon Fernandez, Andrzej Duda, Maciej Korczynski:
Shielding Brands: An In-Depth Analysis of Defensive Domain Registration Practices Against Cyber-Squatting. TMA 2024: 1-11 - [c44]Victor Le Pochat, Simon Fernandez, Tom van Goethem, Samaneh Tajalizadehkhoob, Lieven Desmet, Andrzej Duda, Wouter Joosen, Maciej Korczynski:
Evaluating the Impact of Design Decisions on Passive DNS-Based Domain Rankings. TMA 2024: 1-11 - [c43]Saidu Sokoto, Leonhard Balduf, Dennis Trautwein, Yiluo Wei, Gareth Tyson, Ignacio Castro, Onur Ascigil, George Pavlou, Maciej Korczynski, Björn Scheuermann, Michal Król:
Guardians of the Galaxy: Content Moderation in the InterPlanetary File System. USENIX Security Symposium 2024 - [i19]Yevheniya Nosyk, Maciej Korczynski, Andrzej Duda:
Guardians of DNS Integrity: A Remote Method for Identifying DNSSEC Validators Across the Internet. CoRR abs/2405.19851 (2024) - [i18]Yevheniya Nosyk, Maciej Korczynski, Carlos Hernandez Gañán, Michal Król, Qasim Lone, Andrzej Duda:
Don't Get Hijacked: Prevalence, Mitigation, and Impact of Non-Secure DNS Dynamic Updates. CoRR abs/2405.19871 (2024) - [i17]Simon Fernandez, Olivier Hureau, Andrzej Duda, Maciej Korczynski:
WHOIS Right? An Analysis of WHOIS and RDAP Consistency. CoRR abs/2406.02046 (2024) - [i16]Leonhard Balduf, Saidu Sokoto, Onur Ascigil, Gareth Tyson, Björn Scheuermann, Maciej Korczynski, Ignacio Castro, Michal Król:
Looking AT the Blue Skies of Bluesky. CoRR abs/2408.12449 (2024) - 2023
- [j6]Yevheniya Nosyk, Maciej Korczynski, Qasim Lone, Marcin Skwarek, Baptiste Jonglez, Andrzej Duda:
The Closed Resolver Project: Measuring the Deployment of Inbound Source Address Validation. IEEE/ACM Trans. Netw. 31(6): 2589-2603 (2023) - [c42]Nils Begou, Jeremy Vinoy, Andrzej Duda, Maciej Korczynski:
Exploring the Dark Side of AI: Advanced Phishing Attack Design and Deployment Using ChatGPT. CNS 2023: 1-6 - [c41]Jan Bayer, Sourena Maroofi, Olivier Hureau, Andrzej Duda, Maciej Korczynski:
Building a Resilient Domain Whitelist to Enhance Phishing Blacklist Accuracy. eCrime 2023: 1-14 - [c40]Yevheniya Nosyk, Olivier Hureau, Simon Fernandez, Andrzej Duda, Maciej Korczynski:
Unveiling the Weak Links: Exploring DNS Infrastructure Vulnerabilities and Fortifying Defenses. EuroS&P Workshops 2023: 546-557 - [c39]Yevheniya Nosyk, Maciej Korczynski, Andrzej Duda:
Extended DNS Errors: Unlocking the Full Potential of DNS Troubleshooting. IMC 2023: 213-221 - [c38]Leonhard Balduf, Maciej Korczynski, Onur Ascigil, Navin V. Keizer, George Pavlou, Björn Scheuermann, Michal Król:
The Cloud Strikes Back: Investigating the Decentralization of IPFS. IMC 2023: 391-405 - [c37]Yevheniya Nosyk, Qasim Lone, Yury Zhauniarovich, Carlos Hernandez Gañán, Emile Aben, Giovane C. M. Moura, Samaneh Tajalizadehkhoob, Andrzej Duda, Maciej Korczynski:
Intercept and Inject: DNS Response Manipulation in the Wild. PAM 2023: 461-478 - [c36]Jan Bayer, Ben Chukwuemeka Benjamin, Sourena Maroofi, Thymen Wabeke, Cristian Hesselman, Andrzej Duda, Maciej Korczynski:
Operational Domain Name Classification: From Automatic Ground Truth Generation to Adaptation to Missing Values. PAM 2023: 564-591 - [c35]Ramin Yazdani, Yevheniya Nosyk, Ralph Holz, Maciej Korczynski, Mattijs Jonker, Anna Sperotto:
Hazardous Echoes: The DNS Resolvers that Should Be Put on Mute. TMA 2023: 1-10 - [c34]Yevheniya Nosyk, Maciej Korczynski, Andrzej Duda:
Guardians of DNS Integrity: A Remote Method for Identifying DNSSEC Validators Across the Internet. TrustCom 2023: 1470-1479 - [c33]Yevheniya Nosyk, Maciej Korczynski, Carlos Hernandez Gañán, Michal Król, Qasim Lone, Andrzej Duda:
Don't Get Hijacked: Prevalence, Mitigation, and Impact of Non-Secure DNS Dynamic Updates. TrustCom 2023: 1480-1489 - [i15]Maciej Korczynski, Yevheniya Nosyk:
Source Address Validation. CoRR abs/2301.09952 (2023) - [i14]Maciej Korczynski, Arman Noroozian:
Security Reputation Metrics. CoRR abs/2302.07172 (2023) - [i13]Nils Begou, Jeremy Vinoy, Andrzej Duda, Maciej Korczynski:
Exploring the Dark Side of AI: Advanced Phishing Attack Design and Deployment Using ChatGPT. CoRR abs/2309.10463 (2023) - [i12]Leonhard Balduf, Maciej Korczynski, Onur Ascigil, Navin V. Keizer, George Pavlou, Björn Scheuermann, Michal Król:
The Cloud Strikes Back: Investigating the Decentralization of IPFS. CoRR abs/2309.16203 (2023) - 2022
- [c32]Simon Fernandez, Maciej Korczynski, Andrzej Duda:
Early Detection of Spam Domains with Passive DNS and SPF. PAM 2022: 30-49 - [c31]Yevheniya Nosyk, Maciej Korczynski, Andrzej Duda:
Routing Loops as Mega Amplifiers for DNS-Based DDoS Attacks. PAM 2022: 629-644 - [c30]Qasim Lone, Alisa Frik, Matthew Luckie, Maciej Korczynski, Michel van Eeten, Carlos Gañán:
Deployment of Source Address Validation by Network Operators: A Randomized Control Trial. SP 2022: 2361-2378 - [i11]Simon Fernandez, Maciej Korczynski, Andrzej Duda:
Early Detection of Spam Domains with Passive DNS and SPF. CoRR abs/2205.01932 (2022) - [i10]Jan Bayer, Yevheniya Nosyk, Olivier Hureau, Simon Fernandez, Ivett Paulovics, Andrzej Duda, Maciej Korczynski:
Study on Domain Name System (DNS) Abuse: Technical Report. CoRR abs/2212.08879 (2022) - 2021
- [j5]Sourena Maroofi, Maciej Korczynski, Arnold Hölzel, Andrzej Duda:
Adoption of Email Anti-Spoofing Schemes: A Large Scale Analysis. IEEE Trans. Netw. Serv. Manag. 18(3): 3184-3196 (2021) - [c29]Simon Fernandez, Michele Amoretti, Fabrizio Restori, Maciej Korczynski, Andrzej Duda:
Semantic Identifiers and DNS Names for IoT. ICCCN 2021: 1-9 - [i9]Simon Fernandez, Michele Amoretti, Fabrizio Restori, Maciej Korczynski, Andrzej Duda:
Semantic Identifiers and DNS Names for IoT. CoRR abs/2110.11766 (2021) - 2020
- [c28]Maciej Korczynski, Yevheniya Nosyk, Qasim Lone, Marcin Skwarek, Baptiste Jonglez, Andrzej Duda:
Inferring the Deployment of Inbound Source Address Validation Using DNS Resolvers. ANRW 2020: 9-11 - [c27]Maciej Korczynski, Wojciech Mazurczyk, Pedro Casas:
Preface on the 5th International Workshop on Traffic Measurements for Cybersecurity. EuroS&P Workshops 2020: 521 - [c26]Wissem Soussi, Maciej Korczynski, Sourena Maroofi, Andrzej Duda:
Feasibility of Large-Scale Vulnerability Notifications after GDPR. EuroS&P Workshops 2020: 532-537 - [c25]Sourena Maroofi, Maciej Korczynski, Cristian Hesselman, Benoît Ampeau, Andrzej Duda:
COMAR: Classification of Compromised versus Maliciously Registered Domains. EuroS&P 2020: 607-623 - [c24]Sourena Maroofi, Maciej Korczynski, Andrzej Duda:
Are You Human?: Resilience of Phishing Detection to Evasion Techniques Based on Human Verification. Internet Measurement Conference 2020: 78-86 - [c23]Victor Le Pochat, Tim Van hamme, Sourena Maroofi, Tom van Goethem, Davy Preuveneers, Andrzej Duda, Wouter Joosen, Maciej Korczynski:
A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints. NDSS 2020 - [c22]Maciej Korczynski, Yevheniya Nosyk, Qasim Lone, Marcin Skwarek, Baptiste Jonglez, Andrzej Duda:
Don't Forget to Lock the Front Door! Inferring the Deployment of Source Address Validation of Inbound Traffic. PAM 2020: 107-121 - [c21]Sourena Maroofi, Maciej Korczynski, Andrzej Duda:
From Defensive Registration to Subdomain Protection: Evaluation of Email Anti-Spoofing Schemes for High-Profile Domains. TMA 2020 - [i8]Maciej Korczynski, Yevheniya Nosyk, Qasim Lone, Marcin Skwarek, Baptiste Jonglez, Andrzej Duda:
Don't Forget to Lock the Front Door! Inferring the Deployment of Source Address Validation of Inbound Traffic. CoRR abs/2002.00441 (2020) - [i7]Maciej Korczynski, Yevheniya Nosyk, Qasim Lone, Marcin Skwarek, Baptiste Jonglez, Andrzej Duda:
The Closed Resolver Project: Measuring the Deployment of Source Address Validation of Inbound Traffic. CoRR abs/2006.05277 (2020)
2010 – 2019
- 2019
- [c20]Victor Le Pochat, Tom van Goethem, Samaneh Tajalizadehkhoob, Maciej Korczynski, Wouter Joosen:
Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. NDSS 2019 - [c19]Marcin Skwarek, Maciej Korczynski, Wojciech Mazurczyk, Andrzej Duda:
Characterizing Vulnerability of DNS AXFR Transfers with Global-Scale Scanning. IEEE Symposium on Security and Privacy Workshops 2019: 193-198 - [c18]Pedro Casas, Gonzalo Marín, Germán Capdehourat, Maciej Korczynski:
MLSEC - Benchmarking Shallow and Deep Machine Learning Models for Network Security. IEEE Symposium on Security and Privacy Workshops 2019: 230-235 - 2018
- [j4]Samaneh Tajalizadehkhoob, Rainer Böhme, Carlos Gañán, Maciej Korczynski, Michel van Eeten:
Rotten Apples or Bad Harvest? What We Are Measuring When We Are Measuring Abuse. ACM Trans. Internet Techn. 18(4): 49:1-49:25 (2018) - [c17]Maciej Korczynski, Maarten Wullink, Samaneh Tajalizadehkhoob, Giovane C. M. Moura, Arman Noroozian, Drew Bagley, Cristian Hesselman:
Cybercrime After the Sunrise: A Statistical Analysis of DNS Abuse in New gTLDs. AsiaCCS 2018: 609-623 - [c16]Oliver Gasser, Quirin Scheitle, Pawel Foremski, Qasim Lone, Maciej Korczynski, Stephen D. Strowes, Luuk Hendriks, Georg Carle:
Clusters in the Expanse: Understanding and Unbiasing IPv6 Hitlists. Internet Measurement Conference 2018: 364-378 - [c15]Oliver Gasser, Benjamin Hof, Max Helm, Maciej Korczynski, Ralph Holz, Georg Carle:
In Log We Trust: Revealing Poor Security Practices with Certificate Transparency Logs and Internet Measurements. PAM 2018: 173-185 - [c14]Qasim Lone, Matthew J. Luckie, Maciej Korczynski, Hadi Asghari, Mobin Javed, Michel van Eeten:
Using Crowdsourcing Marketplaces for Network Measurements: The Case of Spoofer. TMA 2018: 1-8 - [e1]Maciej Korczynski, Wojciech Mazurczyk, Pedro Casas:
Proceedings of the 2018 Workshop on Traffic Measurements for Cybersecurity, WTMC@SIGCOMM 2018, Budapest, Hungary, August 20, 2018. ACM 2018, ISBN 978-1-4503-5910-8 [contents] - [i6]Oliver Gasser, Quirin Scheitle, Pawel Foremski, Qasim Lone, Maciej Korczynski, Stephen D. Strowes, Luuk Hendriks, Georg Carle:
Clusters in the Expanse: Understanding and Unbiasing IPv6 Hitlists. CoRR abs/1806.01633 (2018) - 2017
- [j3]Wojciech Mazurczyk, Maciej Korczynski, Koji Nakao, Engin Kirda, Cristian Hesselman, Katsunari Yoshioka:
Traffic Measurements for Cyber Security. IEEE Commun. Mag. 55(7): 12-13 (2017) - [j2]Lazaros K. Gallos, Maciej Korczynski, Nina H. Fefferman:
Anomaly detection through information sharing under different topologies. EURASIP J. Inf. Secur. 2017: 5 (2017) - [c13]Maarten Aertsen, Maciej Korczynski, Giovane C. M. Moura, Samaneh Tajalizadehkhoob, Jan van den Berg:
No domain left behind: is Let's Encrypt democratizing encryption? ANRW 2017: 48-54 - [c12]Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczynski, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten:
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting. CCS 2017: 553-567 - [c11]Maciej Korczynski, Samaneh Tajalizadehkhoob, Arman Noroozian, Maarten Wullink, Cristian Hesselman, Michel van Eeten:
Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs. EuroS&P 2017: 579-594 - [c10]Qasim Lone, Matthew J. Luckie, Maciej Korczynski, Michel van Eeten:
Using Loops Observed in Traceroute to Infer the Ability to Spoof. PAM 2017: 229-241 - [i5]Samaneh Tajalizadehkhoob, Rainer Böhme, Carlos Gañán, Maciej Korczynski, Michel van Eeten:
Rotten Apples or Bad Harvest? What We Are Measuring When We Are Measuring Abuse. CoRR abs/1702.01624 (2017) - [i4]Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczynski, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten:
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting. CoRR abs/1708.06693 (2017) - 2016
- [j1]Maciej Korczynski, Ali Hamieh, Jun Ho Huh, Henrik Holm, S. Raj Rajagopalan, Nina H. Fefferman:
Hive oversight for network intrusion early warning using DIAMoND: a bee-inspired method for fully distributed cyber defense. IEEE Commun. Mag. 54(6): 60-67 (2016) - [c9]Saurabh Verma, Ali Hamieh, Jun Ho Huh, Henrik Holm, Siva Raj Rajagopalan, Maciej Korczynski, Nina H. Fefferman:
Stopping Amplified DNS DDoS Attacks through Distributed Query Rate Sharing. ARES 2016: 69-78 - [c8]Maciej Korczynski, Michal Król, Michel van Eeten:
Zone Poisoning: The How and Where of Non-Secure DNS Dynamic Updates. Internet Measurement Conference 2016: 271-278 - [c7]Samaneh Tajalizadehkhoob, Maciej Korczynski, Arman Noroozian, Carlos Gañán, Michel van Eeten:
Apples, oranges and hosting providers: Heterogeneity and security in the hosting market. NOMS 2016: 289-297 - [c6]Arman Noroozian, Maciej Korczynski, Carlos Hernandez Gañán, Daisuke Makita, Katsunari Yoshioka, Michel van Eeten:
Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service. RAID 2016: 368-389 - [i3]Maarten Aertsen, Maciej Korczynski, Giovane C. M. Moura, Samaneh Tajalizadehkhoob, Jan van den Berg:
No domain left behind: is Let's Encrypt democratizing encryption? CoRR abs/1612.03005 (2016) - [i2]Michel van Eeten, Qasim Lone, Giovane C. M. Moura, Hadi Asghari, Maciej Korczynski:
Evaluating the Impact of AbuseHUB on Botnet Mitigation. CoRR abs/1612.03101 (2016) - [i1]Arman Noroozian, Maciej Korczynski, Samaneh Tajalizadehkhoob, Michel van Eeten:
Developing Security Reputation Metrics for Hosting Providers. CoRR abs/1612.03641 (2016) - 2015
- [c5]Maciej Korczynski, Ali Hamieh, Jun Ho Huh, Henrik Holm, S. Raj Rajagopalan, Nina H. Fefferman:
DIAMoND: Distributed Intrusion/Anomaly Monitoring for Nonparametric Detection. ICCCN 2015: 1-8 - 2014
- [c4]Maciej Korczynski, Andrzej Duda:
Markov chain fingerprinting to classify encrypted traffic. INFOCOM 2014: 781-789 - 2013
- [c3]Maciej Korczynski, Gilles Berger-Sabbatel, Andrzej Duda:
Two Methods for Detecting Malware. MCSS 2013: 95-106 - 2012
- [b1]Maciej Korczynski:
Classification de flux applicatifs et détection d'intrusion dans le trafic Internet. (Classifying Application Flows and Intrusion Detection in Internet Traffic). Grenoble Alpes University, France, 2012 - [c2]Maciej Korczynski, Andrzej Duda:
Classifying service flows in the encrypted skype traffic. ICC 2012: 1064-1068 - 2011
- [c1]Maciej Korczynski, Lucjan Janowski, Andrzej Duda:
An Accurate Sampling Scheme for Detecting SYN Flooding Attacks and Portscans. ICC 2011: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint