Tranco: A research-oriented top sites ranking hardened against manipulation

VL Pochat, T Van Goethem… - arxiv preprint arxiv …, 2018 - arxiv.org
In order to evaluate the prevalence of security and privacy practices on a representative
sample of the Web, researchers rely on website popularity rankings such as the Alexa list …

Operational domain name classification: from automatic ground truth generation to adaptation to missing values

J Bayer, BC Benjamin, S Maroofi, T Wabeke… - … Conference on Passive …, 2023 - Springer
With more than 350 million active domain names and at least 200,000 newly registered
domains per day, it is technically and economically challenging for Internet intermediaries …

Detection of malicious and abusive domain names

E Kidmose, E Lansing, S Brandbyge… - 2018 1st International …, 2018 - ieeexplore.ieee.org
The Domain Name System (DNS) is a critical component of the Internet, and as such it is
widely relied upon by a large part of the world. Consequently, it can be abused for multiple …

Sound Data Sets and Methods for Web Security Research

V Le Pochat - 2023 - lirias.kuleuven.be
Sound research practices are the foundation of valid, reliable, and trustworthy research
results. In the context of web security research, the importance of measurements that yield …

Strengthening Domain Name Abuse Remediation: Domain Classification and Blocklist Enhancement

J Bayer - 2023 - theses.hal.science
Abstract The Domain Name System (DNS) plays a pivotal role in the architecture of the
Internet, translating human-readable domain names into machine-readable IP addresses …

Characterizing sender policy framework configurations at scale

GM Kahraman - 2020 - essay.utwente.nl
Phishing involves disguising oneself as a trustworthy entity in electronic communication, for
example, by pretending to send e-mail on behalf of a company. Phishing e-mails can be …

[PDF][PDF] Identifying DNS Scanners from a TLD Perspective

P Huppert - 2024 - sidnlabs.nl
With the immense growth of internet traffic, gathering data about it has become increasingly
worthwhile for companies and academics alike. One valuable kind of data concerns domain …

[PDF][PDF] Network-based detection of malicious activities-a corporate network perspective

E Kidmose - 2019 - vbn.aau.dk
This dissertation is concerned with exploring how corporations can mitigate security threats
from the Internet. The described research delves into two distinct topics. First, we improve on …

[ЦИТИРОВАНИЕ][C] Rigging Research Results by Manipulating Top Websites Rankings.

VL Pochat, T Goethem, W Joosen - CoRR, 2018