default search action
Marcin Nawrocki
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j2]Martine S. Lenders, Christian Amsüss, Cenk Gündogan, Marcin Nawrocki, Thomas C. Schmidt, Matthias Wählisch:
Securing Name Resolution in the IoT: DNS over CoAP. PACMNET 1(CoNEXT2): 6:1-6:25 (2023) - 2022
- [j1]Marcin Nawrocki, Thomas C. Schmidt, Matthias Wählisch:
Industrial control protocols in the Internet core: Dismantling operational practices. Int. J. Netw. Manag. 32(1) (2022)
Conference and Workshop Papers
- 2024
- [c13]Raphael Hiesgen, Marcin Nawrocki, Marinho P. Barcellos, Daniel Kopp, Oliver Hohlfeld, Echo Chan, Roland Dobbins, Christian Doerr, Christian Rossow, Daniel R. Thomas, Mattijs Jonker, Ricky K. P. Mok, Xiapu Luo, John Kristoff, Thomas C. Schmidt, Matthias Wählisch, kc claffy:
The Age of DDoScovery: An Empirical Comparison of Industry and Academic DDoS Assessments. IMC 2024: 259-279 - [c12]Jonas Mücke, Marcin Nawrocki, Raphael Hiesgen, Thomas C. Schmidt, Matthias Wählisch:
ReACKed QUICer: Measuring the Performance of Instant Acknowledgments in QUIC Handshakes. IMC 2024: 389-400 - 2023
- [c11]Marcin Nawrocki, John Kristoff, Raphael Hiesgen, Chris Kanich, Thomas C. Schmidt, Matthias Wählisch:
SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots. EuroS&P 2023: 576-591 - 2022
- [c10]Marcin Nawrocki, Pouyan Fotouhi Tehrani, Raphael Hiesgen, Jonas Mücke, Thomas C. Schmidt, Matthias Wählisch:
On the interplay between TLS certificates and QUIC performance. CoNEXT 2022: 204-213 - [c9]Raphael Hiesgen, Marcin Nawrocki, Thomas C. Schmidt, Matthias Wählisch:
The Race to the Vulnerable: Measuring the Log4j Shell Incident. TMA 2022 - [c8]Raphael Hiesgen, Marcin Nawrocki, Alistair King, Alberto Dainotti, Thomas C. Schmidt, Matthias Wählisch:
Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope. USENIX Security Symposium 2022: 431-448 - 2021
- [c7]Marcin Nawrocki, Maynard Koch, Thomas C. Schmidt, Matthias Wählisch:
Transparent forwarders: an unnoticed component of the open DNS infrastructure. CoNEXT 2021: 454-462 - [c6]Marcin Nawrocki, Raphael Hiesgen, Thomas C. Schmidt, Matthias Wählisch:
QUICsand: quantifying QUIC reconnaissance scans and DoS flooding events. Internet Measurement Conference 2021: 283-291 - [c5]Marcin Nawrocki, Mattijs Jonker, Thomas C. Schmidt, Matthias Wählisch:
The far side of DNS amplification: tracing the DDoS attack ecosystem from the internet core. Internet Measurement Conference 2021: 419-434 - 2020
- [c4]Marcin Nawrocki, Thomas C. Schmidt, Matthias Wählisch:
Uncovering Vulnerable Industrial Control Systems from the Internet Core. NOMS 2020: 1-9 - 2019
- [c3]Marcin Nawrocki, Jeremias Blendin, Christoph Dietzel, Thomas C. Schmidt, Matthias Wählisch:
Down the Black Hole: Dismantling Operational Practices of BGP Blackholing at IXPs. Internet Measurement Conference 2019: 435-448 - 2018
- [c2]Nico Hinze, Marcin Nawrocki, Mattijs Jonker, Alberto Dainotti, Thomas C. Schmidt, Matthias Wählisch:
On the Potential of BGP Flowspec for DDoS Mitigation at Two Sources: ISP and IXP. SIGCOMM Posters and Demos 2018: 57-59 - 2017
- [c1]Philipp Meyer, Raphael Hiesgen, Thomas C. Schmidt, Marcin Nawrocki, Matthias Wählisch:
Towards Distributed Threat Intelligence in Real-Time. SIGCOMM Posters and Demos 2017: 76-78
Data and Artifacts
- 2023
- [d3]Martine Lenders, Christian Amsüss, Cenk Gündogan, Marcin Nawrocki, Thomas C. Schmidt, Matthias Wählisch:
Artifacts for "Securing Name Resolution in the IoT: DNS over CoAP". Version v1.0. Zenodo, 2023 [all versions] - [d2]Martine S. Lenders, Christian Amsüss, Cenk Gündogan, Marcin Nawrocki, Thomas C. Schmidt, Matthias Wählisch:
Artifacts for "Securing Name Resolution in the IoT: DNS over CoAP". Version v1.1. Zenodo, 2023 [all versions] - [d1]Martine S. Lenders, Christian Amsüss, Cenk Gündogan, Marcin Nawrocki, Thomas C. Schmidt, Matthias Wählisch:
Artifacts for "Securing Name Resolution in the IoT: DNS over CoAP". Version v2.0. Zenodo, 2023 [all versions]
Informal and Other Publications
- 2023
- [i11]Marcin Nawrocki, John Kristoff, Raphael Hiesgen, Chris Kanich, Thomas C. Schmidt, Matthias Wählisch:
SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots. CoRR abs/2302.04614 (2023) - 2022
- [i10]Raphael Hiesgen, Marcin Nawrocki, Thomas C. Schmidt, Matthias Wählisch:
The Race to the Vulnerable: Measuring the Log4j Shell Incident. CoRR abs/2205.02544 (2022) - [i9]Martine S. Lenders, Christian Amsüss, Cenk Gündogan, Marcin Nawrocki, Thomas C. Schmidt, Matthias Wählisch:
Securing name resolution in the IoT: DNS over CoAP. CoRR abs/2207.07486 (2022) - [i8]Jonas Mücke, Marcin Nawrocki, Raphael Hiesgen, Patrick Sattler, Johannes Zirngibl, Georg Carle, Thomas C. Schmidt, Matthias Wählisch:
Waiting for QUIC: On the Opportunities of Passive Measurements to Understand QUIC Deployments. CoRR abs/2209.00965 (2022) - [i7]Marcin Nawrocki, Pouyan Fotouhi Tehrani, Raphael Hiesgen, Jonas Mücke, Thomas C. Schmidt, Matthias Wählisch:
On the Interplay between TLS Certificates and QUIC Performance. CoRR abs/2211.02421 (2022) - 2021
- [i6]Marcin Nawrocki, Mattijs Jonker, Thomas C. Schmidt, Matthias Wählisch:
The Far Side of DNS Amplification: Tracing the DDoS Attack Ecosystem from the Internet Core. CoRR abs/2109.01104 (2021) - [i5]Marcin Nawrocki, Raphael Hiesgen, Thomas C. Schmidt, Matthias Wählisch:
QUICsand: Quantifying QUIC Reconnaissance Scans and DoS Flooding Events. CoRR abs/2109.01106 (2021) - [i4]Marcin Nawrocki, Maynard Koch, Thomas C. Schmidt, Matthias Wählisch:
Transparent Forwarders: An Unnoticed Component of the Open DNS Infrastructure. CoRR abs/2110.02224 (2021) - [i3]Raphael Hiesgen, Marcin Nawrocki, Alistair King, Alberto Dainotti, Thomas C. Schmidt, Matthias Wählisch:
Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope. CoRR abs/2110.05160 (2021) - 2019
- [i2]Marcin Nawrocki, Thomas C. Schmidt, Matthias Wählisch:
Uncovering Vulnerable Industrial Control Systems from the Internet Core. CoRR abs/1901.04411 (2019) - 2016
- [i1]Marcin Nawrocki, Matthias Wählisch, Thomas C. Schmidt, Christian Keil, Jochen Schönfelder:
A Survey on Honeypot Software and Data Analysis. CoRR abs/1608.06249 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint