default search action
Casey T. Deccio
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c20]Protick Bhowmick, Md. Ishtiaq Ashiq, Casey T. Deccio, Taejoong Chung:
TTL Violation of DNS Resolvers in the Wild. PAM 2023: 550-563 - [c19]Casey T. Deccio:
W-Bad: Interception, Inspection, and Interference with Web Proxy Auto-Discovery (WPAD). TMA 2023: 1-10 - [c18]Alden Hilton, Casey T. Deccio, Jacob Davis:
Fourteen Years in the Life: A Root Server's Perspective on DNS Resolver Security. USENIX Security Symposium 2023: 3171-3186 - 2022
- [j3]Alden Hilton, Joel Hirschmann, Casey T. Deccio:
Beware of IPs in Sheep's Clothing: Measurement and Disclosure of IP Spoofing Vulnerabilities. IEEE/ACM Trans. Netw. 30(4): 1659-1673 (2022) - [c17]Nathaniel Bennett, Rebekah Sowards, Casey T. Deccio:
SPFail: discovering, measuring, and remediating vulnerabilities in email sender validation. IMC 2022: 633-646 - [c16]Ramin Yazdani, Alden Hilton, Jeroen van der Ham, Roland van Rijswijk-Deij, Casey T. Deccio, Anna Sperotto, Mattijs Jonker:
Mirrors in the Sky: On the Potential of Clouds in DNS Reflection-based Denial-of-Service Attacks. RAID 2022: 263-275 - 2021
- [c15]Casey T. Deccio, Tarun Yadav, Nathaniel Bennett, Alden Hilton, Michael Howe, Tanner Norton, Jacob Rohde, Eunice Tan, Bradley Taylor:
Measuring email sender validation in the wild. CoNEXT 2021: 230-242 - [c14]Jacob Davis, Casey T. Deccio:
Advertising DNS Protocol Use to Mitigate DDoS Attacks. ICNP 2021: 1-11 - [c13]Jacob Davis, Casey T. Deccio:
A Peek into the DNS Cookie Jar - An Analysis of DNS Cookie Use. PAM 2021: 302-316 - 2020
- [c12]Casey T. Deccio, Alden Hilton, Michael Briggs, Trevin Avery, Robert Richardson:
Behind Closed Doors: A Network Tale of Spoofing, Intrusion, and False DNS Security. Internet Measurement Conference 2020: 65-77
2010 – 2019
- 2019
- [c11]Casey T. Deccio, Jacob Davis:
DNS privacy in practice and preparation. CoNEXT 2019: 138-143 - [c10]Casey T. Deccio, Derek Argueta, Jonathan Demke:
A Quantitative Study of the Deployment of DNS Rate Limiting. ICNC 2019: 442-447 - [c9]Casey T. Deccio:
DNS Diagnostics through the Eye of the Beholder. ICNC 2019: 753-758 - [c8]Jonathan Demke, Casey T. Deccio:
On DNSSEC Negative Responses, Lies, and Zone Size Detection. PAM 2019: 231-243 - 2012
- [j2]Casey T. Deccio, Jeff Sedayao, Krishna Kant, Prasant Mohapatra:
Quantifying DNS namespace influence. Comput. Networks 56(2): 780-794 (2012) - [j1]Casey T. Deccio:
Maintenance, mishaps and mending in deployments of the domain name system security extensions (DNSSEC). Int. J. Crit. Infrastructure Prot. 5(2): 98-103 (2012) - 2011
- [c7]Casey T. Deccio, Jeff Sedayao, Krishna Kant, Prasant Mohapatra:
Quantifying and Improving DNSSEC Availability. ICCCN 2011: 1-7 - 2010
- [c6]Casey T. Deccio, Jeff Sedayao, Krishna Kant, Prasant Mohapatra:
Measuring Availability in the Domain Name System. INFOCOM 2010: 76-80
2000 – 2009
- 2009
- [c5]Casey T. Deccio, Chao-Chih Chen, Jeff Sedayao, Krishna Kant, Prasant Mohapatra:
Quality of Name Resolution in the Domain Name System. ICNP 2009: 113-122 - 2004
- [c4]Casey T. Deccio, Mark J. Clement, Quinn Snell:
A Survivable Multi-agent Approach to Network Routing. Communications in Computing 2004: 9-13 - [c3]Reid Broadbent, Casey T. Deccio, Mark J. Clement:
Temporal Difference Learning in Network Routing. Communications in Computing 2004: 14-20 - [c2]Robert Ball, Mark J. Clement, Feng Huang, Quinn Snell, Casey T. Deccio:
Aggressive telecommunications overbooking ratios. IPCCC 2004: 31-38 - 2003
- [c1]Casey T. Deccio, Joseph J. Ekstrom, D. Ryan Partridge, Kevin Tew, Charles D. Knutson:
A study of the suitability of IrOBEX for high-speed exchange of large data objects. GLOBECOM 2003: 2664-2668
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint