


default search action
Mattijs Jonker
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Raffaele Sommese, Roland van Rijswijk-Deij
, Mattijs Jonker:
This Is a Local Domain: On Amassing Country-Code Top-Level Domains from Public Data. Comput. Commun. Rev. 54(2): 2-9 (2024) - [c44]Bernhard Degen
, Mattijs Jonker
, Roland van Rijswijk-Deij
, Raffaele Sommese
:
An Empirical Characterization of Anycast Convergence Time. ANRW 2024 - [c43]Romain Fontugne
, Malte Tashiro
, Raffaele Sommese
, Mattijs Jonker
, Zachary S. Bischof
, Emile Aben
:
The Wisdom of the Measurement Crowd: Building the Internet Yellow Pages a Knowledge Graph for the Internet. IMC 2024: 183-198 - [c42]Raphael Hiesgen
, Marcin Nawrocki
, Marinho P. Barcellos
, Daniel Kopp
, Oliver Hohlfeld
, Echo Chan
, Roland Dobbins
, Christian Doerr
, Christian Rossow
, Daniel R. Thomas
, Mattijs Jonker
, Ricky K. P. Mok, Xiapu Luo
, John Kristoff
, Thomas C. Schmidt
, Matthias Wählisch
, kc claffy
:
The Age of DDoScovery: An Empirical Comparison of Industry and Academic DDoS Assessments. IMC 2024: 259-279 - [c41]Raffaele Sommese
, Gautam Akiwate
, Antonia Affinito
, Moritz Müller
, Mattijs Jonker
, kc claffy
:
DarkDNS: Revisiting the Value of Rapid Zone Update. IMC 2024: 454-461 - [c40]Ramin Yazdani
, Mattijs Jonker, Anna Sperotto:
Swamp of Reflectors: Investigating the Ecosystem of Open DNS Resolvers. PAM (2) 2024: 3-18 - [c39]Jonas Kaspereit, Gurur Öndarö, Gustavo Luvizotto Cesar, Simon Ebbers, Fabian Ising, Christoph Saatjohann, Mattijs Jonker, Ralph Holz, Sebastian Schinzel:
LanDscAPe: Exploring LDAP weaknesses and data leaks at Internet scale. USENIX Security Symposium 2024 - [i11]Raffaele Sommese, Gautam Akiwate, Antonia Affinito, Moritz Müller, Mattijs Jonker, kc claffy
:
DarkDNS: Revisiting the Value of Rapid Zone Update. CoRR abs/2405.12010 (2024) - [i10]Raphael Hiesgen, Marcin Nawrocki, Marinho P. Barcellos, Daniel Kopp, Oliver Hohlfeld, Echo Chan, Roland Dobbins, Christian Doerr, Christian Rossow, Daniel R. Thomas, Mattijs Jonker, Ricky K. P. Mok, Xiapu Luo, John Kristoff, Thomas C. Schmidt, Matthias Wählisch, kc claffy:
The Age of DDoScovery: An Empirical Comparison of Industry and Academic DDoS Assessments. CoRR abs/2410.11708 (2024) - [i9]Patrick Sattler, Johannes Zirngibl, Fahad Hilal, Oliver Gasser, Kevin Vermeulen, Georg Carle, Mattijs Jonker:
ECSeptional DNS Data: Evaluating Nameserver ECS Deployments with Response-Aware Scanning. CoRR abs/2412.08478 (2024) - 2023
- [j5]Patrick Sattler
, Johannes Zirngibl
, Mattijs Jonker
, Oliver Gasser
, Georg Carle
, Ralph Holz
:
Packed to the Brim: Investigating the Impact of Highly Responsive Prefixes on Internet-wide Measurement Campaigns. PACMNET 1(CoNEXT3): 24:1-24:21 (2023) - [c38]Alfred Arouna
, Ioana Livadariu
, Roland van Rijswijk-Deij
, Mattijs Jonker
:
Advancing in Reverse: A Comprehensive Characterization of IN-ADDR.ARPA Deployment. AINTEC 2023: 37-45 - [c37]Alfred Arouna
, Ioana Livadariu
, Mattijs Jonker
:
Lowering the Barriers to Working with Public RIR-Level Data. ANRW 2023: 24-26 - [c36]Enze Liu
, Gautam Akiwate
, Mattijs Jonker, Ariana Mirian, Grant Ho, Geoffrey M. Voelker, Stefan Savage:
Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy. EuroS&P 2023: 373-391 - [c35]Muhammad Yasir Muzayan Haq
, Abhishta Abhishta
, Raffaele Sommese, Mattijs Jonker, Lambert J. M. Nieuwenhuis:
Assessing Network Operator Actions to Enhance Digital Sovereignty and Strengthen Network Resilience: A Longitudinal Analysis during the Russia-Ukraine Conflict. EuroS&P Workshops 2023: 487-494 - [c34]Raffaele Sommese
, Mattijs Jonker
:
Poster: Through the ccTLD Looking Glass: Mining CT Logs for Fun, Profit and Domain Names. IMC 2023: 714-715 - [c33]Ramin Yazdani
, Yevheniya Nosyk, Ralph Holz
, Maciej Korczynski, Mattijs Jonker, Anna Sperotto:
Hazardous Echoes: The DNS Resolvers that Should Be Put on Mute. TMA 2023: 1-10 - [i8]Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Grant Ho, Geoffrey M. Voelker, Stefan Savage:
Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy. CoRR abs/2302.07287 (2023) - [i7]Muhammad Yasir Muzayan Haq, Abhishta Abhishta, Raffaele Sommese, Mattijs Jonker, Lambert J. M. Nieuwenhuis:
Assessing Network Operator Actions to Enhance Digital Sovereignty and Strengthen Network Resilience: A Longitudinal Analysis during the Russia-Ukraine Conflict. CoRR abs/2305.17666 (2023) - [i6]Raffaele Sommese, Roland van Rijswijk-Deij, Mattijs Jonker:
This Is a Local Domain: On Amassing Country-Code Top-Level Domains from Public Data. CoRR abs/2309.01441 (2023) - [i5]Patrick Sattler, Johannes Zirngibl, Mattijs Jonker, Oliver Gasser, Georg Carle, Ralph Holz
:
Packed to the Brim: Investigating the Impact of Highly Responsive Prefixes on Internet-wide Measurement Campaigns. CoRR abs/2310.17012 (2023) - 2022
- [c32]Raffaele Sommese
, Mattijs Jonker, Jeroen van der Ham
, Giovane C. M. Moura:
Assessing e-Government DNS Resilience. CNSM 2022: 118-126 - [c31]Muhammad Yasir Muzayan Haq
, Mattijs Jonker, Roland van Rijswijk-Deij
, kc claffy
, Lambert J. M. Nieuwenhuis, Abhishta Abhishta
:
No Time for Downtime: Understanding Post-Attack Behaviors by Customers of Managed DNS Providers. EuroS&P Workshops 2022: 322-331 - [c30]Olivier van der Toorn, Roland van Rijswijk-Deij
, Raffaele Sommese
, Anna Sperotto, Mattijs Jonker:
Saving Brian's privacy: the perils of privacy exposure through reverse DNS. IMC 2022: 1-13 - [c29]Gautam Akiwate
, Raffaele Sommese
, Mattijs Jonker, Zakir Durumeric, kc claffy
, Geoffrey M. Voelker, Stefan Savage:
Retroactive identification of targeted DNS infrastructure hijacking. IMC 2022: 14-32 - [c28]Raffaele Sommese
, kc claffy
, Roland van Rijswijk-Deij
, Arnab Chattopadhyay, Alberto Dainotti
, Anna Sperotto, Mattijs Jonker:
Investigating the impact of DDoS attacks on DNS infrastructure. IMC 2022: 51-64 - [c27]Mattijs Jonker, Gautam Akiwate, Antonia Affinito, kc claffy
, Alessio Botta, Geoffrey M. Voelker, Roland van Rijswijk-Deij
, Stefan Savage:
Where .ru?: assessing the impact of conflict on russian domain infrastructure. IMC 2022: 159-165 - [c26]Raffaele Sommese, Mattijs Jonker, kc claffy
:
Observable KINDNS: validating DNS hygiene. IMC 2022: 740-741 - [c25]Alfred Arouna, Mattijs Jonker, Ioana Livadariu:
On unifying diverse DNS data sources. IMC 2022: 752-753 - [c24]Luciano Zembruzki
, Raffaele Sommese
, Lisandro Zambenedetti Granville
, Arthur Selle Jacobs, Mattijs Jonker, Giovane C. M. Moura:
Hosting Industry Centralization and Consolidation. NOMS 2022: 1-9 - [c23]Ramin Yazdani
, Roland van Rijswijk-Deij
, Mattijs Jonker, Anna Sperotto:
A Matter of Degree: Characterizing the Amplification Power of Open DNS Resolvers. PAM 2022: 293-318 - [c22]Ramin Yazdani
, Alden Hilton, Jeroen van der Ham
, Roland van Rijswijk-Deij
, Casey T. Deccio, Anna Sperotto, Mattijs Jonker:
Mirrors in the Sky: On the Potential of Clouds in DNS Reflection-based Denial-of-Service Attacks. RAID 2022: 263-275 - [c21]Antonia Affinito, Raffaele Sommese, Gautam Akiwate, Stefan Savage, kc claffy, Geoffrey M. Voelker, Alessio Botta, Mattijs Jonker:
Domain Name Lifetimes: Baseline and Threats. TMA 2022 - [c20]Johannes Zirngibl, Steffen Deusch, Patrick Sattler, Juliane Aulbach, Georg Carle, Mattijs Jonker:
Domain Parking: Largely Present, Rarely Considered! TMA 2022 - [i4]Olivier van der Toorn, Raffaele Sommese, Anna Sperotto, Roland van Rijswijk-Deij, Mattijs Jonker:
Saving Brian's Privacy: the Perils of Privacy Exposure through Reverse DNS. CoRR abs/2202.01160 (2022) - [i3]Muhammad Yasir Muzayan Haq, Mattijs Jonker, Roland van Rijswijk-Deij, Kimberly C. Claffy
, Lambert J. M. Nieuwenhuis, Abhishta Abhishta
:
No Time for Downtime: Understanding Post-Attack Behaviors by Customers of Managed DNS Providers. CoRR abs/2205.12765 (2022) - 2021
- [j4]kc claffy
, David D. Clark, John S. Heidemann, Fabian E. Bustamante, Mattijs Jonker, Aaron Schulman, Ellen Zegura:
Workshop on Overcoming Measurement Barriers to Internet Research (WOMBIR 2021) final report. Comput. Commun. Rev. 51(3): 33-40 (2021) - [c19]Olivier van der Toorn, Johannes Krupp
, Mattijs Jonker, Roland van Rijswijk-Deij
, Christian Rossow, Anna Sperotto:
ANYway: Measuring the Amplification DDoS Potential of Domains. CNSM 2021: 500-508 - [c18]Enze Liu
, Gautam Akiwate
, Mattijs Jonker, Ariana Mirian, Stefan Savage, Geoffrey M. Voelker:
Who's got your mail?: characterizing mail service provider usage. Internet Measurement Conference 2021: 122-136 - [c17]Marcin Nawrocki, Mattijs Jonker, Thomas C. Schmidt, Matthias Wählisch:
The far side of DNS amplification: tracing the DDoS attack ecosystem from the internet core. Internet Measurement Conference 2021: 419-434 - [c16]Raffaele Sommese, Gautam Akiwate, Mattijs Jonker, Giovane C. M. Moura, Marco Davids, Roland van Rijswijk-Deij, Geoffrey M. Voelker, Stefan Savage, Kimberly C. Claffy, Anna Sperotto:
Characterization of Anycast Adoption in the DNS Authoritative Infrastructure. TMA 2021 - [i2]Marcin Nawrocki, Mattijs Jonker, Thomas C. Schmidt, Matthias Wählisch:
The Far Side of DNS Amplification: Tracing the DDoS Attack Ecosystem from the Internet Core. CoRR abs/2109.01104 (2021) - [i1]Giovane C. M. Moura, Raffaele Sommese, Mattijs Jonker:
Hosting Industry Centralization and Consolidation. CoRR abs/2109.01187 (2021) - 2020
- [j3]Cristian Hesselman, Paola Grosso
, Ralph Holz
, Fernando Kuipers, Janet Hui Xue, Mattijs Jonker, Joeri de Ruiter
, Anna Sperotto, Roland van Rijswijk-Deij
, Giovane C. M. Moura, Aiko Pras, Cees de Laat:
A Responsible Internet to Increase Trust in the Digital World. J. Netw. Syst. Manag. 28(4): 882-922 (2020) - [c15]Raffaele Sommese
, Mattijs Jonker, Roland van Rijswijk-Deij
, Alberto Dainotti
, Kimberly C. Claffy
, Anna Sperotto:
The Forgotten Side of DNS: Orphan and Abandoned Records. EuroS&P Workshops 2020: 538-543 - [c14]Gautam Akiwate
, Mattijs Jonker, Raffaele Sommese
, Ian D. Foster
, Geoffrey M. Voelker, Stefan Savage, kc claffy
:
Unresolved Issues: Prevalence, Persistence, and Perils of Lame Delegations. Internet Measurement Conference 2020: 281-294 - [c13]Raffaele Sommese
, Leandro Marcio Bertholdo
, Gautam Akiwate
, Mattijs Jonker, Roland van Rijswijk-Deij
, Alberto Dainotti
, kc claffy
, Anna Sperotto:
MAnycast2: Using Anycast to Measure Anycast. Internet Measurement Conference 2020: 456-463 - [c12]Mattijs Jonker, Anna Sperotto, Aiko Pras:
DDoS Mitigation: A Measurement-Based Approach. NOMS 2020: 1-6 - [c11]Raffaele Sommese
, Giovane C. M. Moura, Mattijs Jonker, Roland van Rijswijk-Deij
, Alberto Dainotti
, Kimberly C. Claffy
, Anna Sperotto:
When Parents and Children Disagree: Diving into DNS Delegation Inconsistency. PAM 2020: 175-189
2010 – 2019
- 2018
- [c10]Mattijs Jonker, Aiko Pras, Alberto Dainotti, Anna Sperotto:
A First Joint Look at DoS Attacks and BGP Blackholing in the Wild. Internet Measurement Conference 2018: 457-463 - [c9]Nico Hinze, Marcin Nawrocki, Mattijs Jonker, Alberto Dainotti
, Thomas C. Schmidt
, Matthias Wählisch
:
On the Potential of BGP Flowspec for DDoS Mitigation at Two Sources: ISP and IXP. SIGCOMM Posters and Demos 2018: 57-59 - 2017
- [j2]Rick Hofstede, Mattijs Jonker, Anna Sperotto
, Aiko Pras
:
Flow-Based Web Application Brute-Force Attack and Compromise Detection. J. Netw. Syst. Manag. 25(4): 735-758 (2017) - [c8]Mattijs Jonker, Anna Sperotto:
Measuring exposure in DDoS protection services. CNSM 2017: 1-9 - [c7]Mattijs Jonker, Alistair King, Johannes Krupp
, Christian Rossow, Anna Sperotto, Alberto Dainotti
:
Millions of targets under attack: a macroscopic characterization of the DoS ecosystem. Internet Measurement Conference 2017: 100-113 - 2016
- [j1]Roland van Rijswijk-Deij
, Mattijs Jonker, Anna Sperotto
, Aiko Pras:
A High-Performance, Scalable Infrastructure for Large-Scale Active DNS Measurements. IEEE J. Sel. Areas Commun. 34(6): 1877-1888 (2016) - [c6]Roland van Rijswijk-Deij
, Mattijs Jonker, Anna Sperotto
:
On the adoption of the elliptic curve digital signature algorithm (ECDSA) in DNSSEC. CNSM 2016: 258-262 - [c5]Mattijs Jonker, Anna Sperotto, Roland van Rijswijk-Deij, Ramin Sadre, Aiko Pras:
Measuring the Adoption of DDoS Protection Services. Internet Measurement Conference 2016: 279-285 - 2015
- [c4]Mattijs Jonker, Anna Sperotto
:
Mitigating DDoS Attacks Using OpenFlow-Based Software Defined Networking. AIMS 2015: 129-133 - [c3]Mattijs Jonker, Rick Hofstede, Anna Sperotto
, Aiko Pras:
Unveiling flat traffic on the Internet: An SSH attack case study. IM 2015: 270-278 - [c2]Olivier van der Toorn, Rick Hofstede, Mattijs Jonker, Anna Sperotto
:
A first look at HTTP(S) intrusion detection using NetFlow/IPFIX. IM 2015: 862-865 - [c1]Roland van Rijswijk-Deij
, Mattijs Jonker, Anna Sperotto
, Aiko Pras:
The Internet of Names: A DNS Big Dataset. SIGCOMM 2015: 91-92
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 21:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint