Cited By
View all- Liu GJin LHao SZhang YLiu DStavrou AWang HMontpetit MLeivadeas AUhlig SJaved M(2023)Dial "N" for NXDomain: The Scale, Origin, and Security Implications of DNS Queries to Non-Existent DomainsProceedings of the 2023 ACM on Internet Measurement Conference10.1145/3618257.3624805(198-212)Online publication date: 24-Oct-2023
- Žiža KTadić PVuletić P(2023)DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviourInternational Journal of Information Security10.1007/s10207-023-00723-w22:6(1865-1880)Online publication date: 1-Dec-2023
- Moure-Garrido MCampo CGarcia-Rubio CIgartua Mde la Cruz Llopis LBegin T(2022)Detecting Malicious Use of DoH Tunnels Using Statistical Traffic AnalysisProceedings of the 19th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks10.1145/3551663.3558605(25-32)Online publication date: 24-Oct-2022
- Show More Cited By