default search action
Roland van Rijswijk-Deij
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Raffaele Sommese, Roland van Rijswijk-Deij, Mattijs Jonker:
This Is a Local Domain: On Amassing Country-Code Top-Level Domains from Public Data. Comput. Commun. Rev. 54(2): 2-9 (2024) - [c52]Bernhard Degen, Mattijs Jonker, Roland van Rijswijk-Deij, Raffaele Sommese:
An Empirical Characterization of Anycast Convergence Time. ANRW 2024 - [c51]Minhyeok Kang, Weitong Li, Roland van Rijswijk-Deij, Ted Taekyoung Kwon, Taejoong Chung:
IRRedicator: Pruning IRR with RPKI-Valid BGP Insights. NDSS 2024 - [c50]Tina Rezaei, Suzan Bayhan, Andrea Continella, Roland van Rijswijk-Deij:
ERAFL: Efficient Resource Allocation for Federated Learning Training in Smart Homes. NOMS 2024: 1-5 - [c49]Nils Rodday, Gabi Dreo Rodosek, Aiko Pras, Roland van Rijswijk-Deij:
Exploring the Benefit of Path Plausibility Algorithms in BGP. NOMS 2024: 1-10 - [c48]Dominic Laniewski, Eric Lanfer, Bernd Meijerink, Roland van Rijswijk-Deij, Nils Aschenbruck:
WetLinks: A Large-Scale Longitudinal Starlink Dataset with Contiguous Weather Data. TMA 2024: 1-9 - [i9]Dominic Laniewski, Eric Lanfer, Bernd Meijerink, Roland van Rijswijk-Deij, Nils Aschenbruck:
WetLinks: a Large-Scale Longitudinal Starlink Dataset with Contiguous Weather Data. CoRR abs/2402.16448 (2024) - 2023
- [j14]Koen van Hove, Jeroen van der Ham-de Vos, Roland van Rijswijk-Deij:
rpkiller: Threat Analysis of the BGP Resource Public Key Infrastructure. DTRAP 4(4): 58:1-58:24 (2023) - [c47]Alfred Arouna, Ioana Livadariu, Roland van Rijswijk-Deij, Mattijs Jonker:
Advancing in Reverse: A Comprehensive Characterization of IN-ADDR.ARPA Deployment. AINTEC 2023: 37-45 - [c46]Etienne Khan, Anna Sperotto, Jeroen van der Ham, Roland van Rijswijk-Deij:
Stranger VPNs: Investigating the Geo-Unblocking Capabilities of Commercial VPN Providers. PAM 2023: 46-68 - [i8]Raffaele Sommese, Roland van Rijswijk-Deij, Mattijs Jonker:
This Is a Local Domain: On Amassing Country-Code Top-Level Domains from Public Data. CoRR abs/2309.01441 (2023) - [i7]Koen van Hove, Jeroen van der Ham-de Vos, Roland van Rijswijk-Deij:
Your Vulnerability Disclosure Is Important To Us: An Analysis of Coordinated Vulnerability Disclosure Responses Using a Real Security Issue. CoRR abs/2312.07284 (2023) - 2022
- [j13]Olivier van der Toorn, Moritz Müller, Sara Dickinson, Cristian Hesselman, Anna Sperotto, Roland van Rijswijk-Deij:
Addressing the challenges of modern DNS a comprehensive tutorial. Comput. Sci. Rev. 45: 100469 (2022) - [j12]Trinh Viet Doan, Roland van Rijswijk-Deij, Oliver Hohlfeld, Vaibhav Bajpai:
An Empirical View on Consolidation of the Web. ACM Trans. Internet Techn. 22(3): 70:1-70:30 (2022) - [c45]Leandro M. Bertholdo, Sandro L. A. Ferreira, João M. Ceron, Lisandro Zambenedetti Granville, Ralph Holz, Roland van Rijswijk-Deij:
On the Asymmetry of Internet eXchange Points -Why Should IXPs and CDNs Care? CNSM 2022: 73-81 - [c44]Muhammad Yasir Muzayan Haq, Mattijs Jonker, Roland van Rijswijk-Deij, kc claffy, Lambert J. M. Nieuwenhuis, Abhishta Abhishta:
No Time for Downtime: Understanding Post-Attack Behaviors by Customers of Managed DNS Providers. EuroS&P Workshops 2022: 322-331 - [c43]Olivier van der Toorn, Roland van Rijswijk-Deij, Raffaele Sommese, Anna Sperotto, Mattijs Jonker:
Saving Brian's privacy: the perils of privacy exposure through reverse DNS. IMC 2022: 1-13 - [c42]Raffaele Sommese, kc claffy, Roland van Rijswijk-Deij, Arnab Chattopadhyay, Alberto Dainotti, Anna Sperotto, Mattijs Jonker:
Investigating the impact of DDoS attacks on DNS infrastructure. IMC 2022: 51-64 - [c41]Mattijs Jonker, Gautam Akiwate, Antonia Affinito, kc claffy, Alessio Botta, Geoffrey M. Voelker, Roland van Rijswijk-Deij, Stefan Savage:
Where .ru?: assessing the impact of conflict on russian domain infrastructure. IMC 2022: 159-165 - [c40]Eric Lanfer, Thomas Hänel, Roland van Rijswijk-Deij, Nils Aschenbruck:
Improving Proximity Classification for Contact Tracing using a Multi-channel Approach. LCN 2022: 64-72 - [c39]Ramin Yazdani, Roland van Rijswijk-Deij, Mattijs Jonker, Anna Sperotto:
A Matter of Degree: Characterizing the Amplification Power of Open DNS Resolvers. PAM 2022: 293-318 - [c38]Ramin Yazdani, Alden Hilton, Jeroen van der Ham, Roland van Rijswijk-Deij, Casey T. Deccio, Anna Sperotto, Mattijs Jonker:
Mirrors in the Sky: On the Potential of Clouds in DNS Reflection-based Denial-of-Service Attacks. RAID 2022: 263-275 - [c37]Carsten Strotmann, Patrick Ben Koetter, Roland van Rijswijk-Deij, Markus de Brün, Anders Kölligan:
Studie über das Gefahrenpotential und Gegenmaßnahmen zu Angriffen auf das DNS Protokoll durch IP-Fragmentierung. Sicherheit 2022: 209-212 - [c36]Hyeonmin Lee, Md. Ishtiaq Ashiq, Moritz Müller, Roland van Rijswijk-Deij, Ted Taekyoung Kwon, Taejoong Chung:
Under the Hood of DANE Mismanagement in SMTP. USENIX Security Symposium 2022: 1-16 - [e1]Roya Ensafi, Andra Lutu, Anna Sperotto, Roland van Rijswijk-Deij:
6th Network Traffic Measurement and Analysis Conference, TMA 2022, Enschede, The Netherlands, June 27-30, 2022. IFIP 2022, ISBN 978-3-903176-47-8 [contents] - [i6]Eric Lanfer, Thomas Hänel, Roland van Rijswijk-Deij, Nils Aschenbruck:
Improving Proximity Estimation for Contact Tracing using a Multi-channel Approach. CoRR abs/2201.10401 (2022) - [i5]Olivier van der Toorn, Raffaele Sommese, Anna Sperotto, Roland van Rijswijk-Deij, Mattijs Jonker:
Saving Brian's Privacy: the Perils of Privacy Exposure through Reverse DNS. CoRR abs/2202.01160 (2022) - [i4]Koen van Hove, Jeroen van der Ham, Roland van Rijswijk-Deij:
Rpkiller: Threat Analysis from an RPKI Relying Party Perspective. CoRR abs/2203.00993 (2022) - [i3]Muhammad Yasir Muzayan Haq, Mattijs Jonker, Roland van Rijswijk-Deij, Kimberly C. Claffy, Lambert J. M. Nieuwenhuis, Abhishta Abhishta:
No Time for Downtime: Understanding Post-Attack Behaviors by Customers of Managed DNS Providers. CoRR abs/2205.12765 (2022) - 2021
- [c35]Olivier van der Toorn, Johannes Krupp, Mattijs Jonker, Roland van Rijswijk-Deij, Christian Rossow, Anna Sperotto:
ANYway: Measuring the Amplification DDoS Potential of Domains. CNSM 2021: 500-508 - [c34]Leandro Marcio Bertholdo, João M. Ceron, Wouter B. de Vries, Ricardo de Oliveira Schmidt, Lisandro Zambenedetti Granville, Roland van Rijswijk-Deij, Aiko Pras:
TANGLED: A Cooperative Anycast Testbed. IM 2021: 766-771 - [c33]Leandro Marcio Bertholdo, João M. Ceron, Lisandro Zambenedetti Granville, Roland van Rijswijk-Deij:
Forecasting the Impact of IXP Outages Using Anycast. TMA 2021 - [c32]Raffaele Sommese, Gautam Akiwate, Mattijs Jonker, Giovane C. M. Moura, Marco Davids, Roland van Rijswijk-Deij, Geoffrey M. Voelker, Stefan Savage, Kimberly C. Claffy, Anna Sperotto:
Characterization of Anycast Adoption in the DNS Authoritative Infrastructure. TMA 2021 - 2020
- [j11]Moritz Müller, Jins de Jong, Maran van Heesch, Benno J. Overeinder, Roland van Rijswijk-Deij:
Retrofitting post-quantum cryptography in internet protocols: a case study of DNSSEC. Comput. Commun. Rev. 50(4): 49-57 (2020) - [j10]Cristian Hesselman, Paola Grosso, Ralph Holz, Fernando Kuipers, Janet Hui Xue, Mattijs Jonker, Joeri de Ruiter, Anna Sperotto, Roland van Rijswijk-Deij, Giovane C. M. Moura, Aiko Pras, Cees de Laat:
A Responsible Internet to Increase Trust in the Digital World. J. Netw. Syst. Manag. 28(4): 882-922 (2020) - [j9]Wouter B. de Vries, Roland van Rijswijk-Deij, Pieter-Tjerk de Boer, Aiko Pras:
Passive Observations of a Large DNS Service: 2.5 Years in the Life of Google. IEEE Trans. Netw. Serv. Manag. 17(1): 190-200 (2020) - [c31]Leandro Marcio Bertholdo, João M. Ceron, Lisandro Zambenedetti Granville, Giovane C. M. Moura, Cristian Hesselman, Roland van Rijswijk-Deij:
BGP Anycast Tuner: Intuitive Route Management for Anycast Services. CNSM 2020: 1-7 - [c30]Nils Rodday, Ruben van Baaren, Luuk Hendriks, Roland van Rijswijk-Deij, Aiko Pras, Gabi Dreo:
Evaluating RPKI ROV identification methodologies in automatically generated mininet topologies. CoNEXT 2020: 530-531 - [c29]Raffaele Sommese, Mattijs Jonker, Roland van Rijswijk-Deij, Alberto Dainotti, Kimberly C. Claffy, Anna Sperotto:
The Forgotten Side of DNS: Orphan and Abandoned Records. EuroS&P Workshops 2020: 538-543 - [c28]Olivier van der Toorn, Roland van Rijswijk-Deij, Tobias Fiebig, Martina Lindorfer, Anna Sperotto:
TXTing 101: Finding Security Issues in the Long Tail of DNS TXT Records. EuroS&P Workshops 2020: 544-549 - [c27]Moritz Müller, Willem Toorop, Taejoong Chung, Jelte Jansen, Roland van Rijswijk-Deij:
The Reality of Algorithm Agility: Studying the DNSSEC Algorithm Life-Cycle. Internet Measurement Conference 2020: 295-308 - [c26]Raffaele Sommese, Leandro Marcio Bertholdo, Gautam Akiwate, Mattijs Jonker, Roland van Rijswijk-Deij, Alberto Dainotti, kc claffy, Anna Sperotto:
MAnycast2: Using Anycast to Measure Anycast. Internet Measurement Conference 2020: 456-463 - [c25]Wouter B. de Vries, Salman Aljammaz, Roland van Rijswijk-Deij:
Global-Scale Anycast Network Management with Verfploeter. NOMS 2020: 1-9 - [c24]Raffaele Sommese, Giovane C. M. Moura, Mattijs Jonker, Roland van Rijswijk-Deij, Alberto Dainotti, Kimberly C. Claffy, Anna Sperotto:
When Parents and Children Disagree: Diving into DNS Delegation Inconsistency. PAM 2020: 175-189 - [c23]Hyeonmin Lee, Aniketh Gireesh, Roland van Rijswijk-Deij, Taekyoung Kwon, Taejoong Chung:
A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email. USENIX Security Symposium 2020: 613-630 - [i2]Leandro Marcio Bertholdo, João M. Ceron, Wouter B. de Vries, Ricardo de Oliveira Schmidt, Lisandro Zambenedetti Granville, Roland van Rijswijk-Deij, Aiko Pras:
Tangled: A Cooperative Anycast Testbed. CoRR abs/2008.12881 (2020) - [i1]Sara Dickinson, Benno J. Overeinder, Roland van Rijswijk-Deij, Allison Mankin:
Recommendations for DNS Privacy Service Operators. RFC 8932: 1-34 (2020)
2010 – 2019
- 2019
- [j8]Moritz Müller, Taejoong Chung, Alan Mislove, Roland van Rijswijk-Deij:
Rolling With Confidence: Managing the Complexity of DNSSEC Operations. IEEE Trans. Netw. Serv. Manag. 16(3): 1199-1211 (2019) - [c22]Roland van Rijswijk-Deij, Gijs Rijnders, Matthijs Bomhoff, Luca Allodi:
Privacy-Conscious Threat Intelligence Using DNSBloom. IM 2019: 98-106 - [c21]Moritz Müller, Matthew Thomas, Duane Wessels, Wes Hardaker, Taejoong Chung, Willem Toorop, Roland van Rijswijk-Deij:
Roll, Roll, Roll your Root: A Comprehensive Analysis of the First Ever DNSSEC Root KSK Rollover. Internet Measurement Conference 2019: 1-14 - [c20]Taejoong Chung, Emile Aben, Tim Bruijnzeels, Balakrishnan Chandrasekaran, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Roland van Rijswijk-Deij, John P. Rula, Nick Sullivan:
RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins. Internet Measurement Conference 2019: 406-419 - [c19]Wouter B. de Vries, Quirin Scheitle, Moritz Müller, Willem Toorop, Ralph Dolmans, Roland van Rijswijk-Deij:
A First Look at QNAME Minimization in the Domain Name System. PAM 2019: 147-160 - 2018
- [j7]Quirin Scheitle, Taejoong Chung, Jens Hiller, Oliver Gasser, Johannes Naab, Roland van Rijswijk-Deij, Oliver Hohlfeld, Ralph Holz, David R. Choffnes, Alan Mislove, Georg Carle:
A First Look at Certification Authority Authorization (CAA). Comput. Commun. Rev. 48(2): 10-23 (2018) - [j6]Abhishta Abhishta, Roland van Rijswijk-Deij, Lambert J. M. Nieuwenhuis:
Measuring the impact of a successful DDoS attack on the customer behaviour of managed DNS service providers. Comput. Commun. Rev. 48(5): 70-76 (2018) - [c18]Moritz Müller, Roland van Rijswijk-Deij:
Towards an Independent and Resilient DNS. AIMS 2018: 60-64 - [c17]Quirin Scheitle, Taejoong Chung, Johanna Amann, Oliver Gasser, Lexi Brent, Georg Carle, Ralph Holz, Jens Hiller, Johannes Naab, Roland van Rijswijk-Deij, Oliver Hohlfeld, David R. Choffnes, Alan Mislove:
Measuring Adoption of Security Additions to the HTTPS Ecosystem. ANRW 2018: 1-2 - [c16]Tho Le, Roland van Rijswijk-Deij, Luca Allodi, Nicola Zannone:
Economic incentives on DNSSEC deployment: Time to move from quantity to quality. NOMS 2018: 1-9 - [c15]Olivier van der Toorn, Roland van Rijswijk-Deij, Bart Geesink, Anna Sperotto:
Melting the snow: Using active DNS measurements to detect snowshoe spam domains. NOMS 2018: 1-9 - [c14]Abhishta, Roland van Rijswijk-Deij, Lambert J. M. Nieuwenhuis:
Measuring the Impact of a Successful DDoS Attack on the Customer Behaviour of Managed DNS Service Providers. WTMC@SIGCOMM 2018: 1-7 - [c13]Wouter B. de Vries, Roland van Rijswijk-Deij, Pieter-Tjerk de Boer, Aiko Pras:
Passive Observations of a Large DNS Service: 2.5 Years in the Life of Google. TMA 2018: 1-8 - 2017
- [j5]Roland van Rijswijk-Deij, Kaspar Hageman, Anna Sperotto, Aiko Pras:
The Performance Impact of Elliptic Curve Cryptography on DNSSEC Validation. IEEE/ACM Trans. Netw. 25(2): 738-750 (2017) - [j4]Taejoong Chung, Roland van Rijswijk-Deij, Balakrishnan Chandrasekaran, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson:
An End-to-End View of DNSSEC Ecosystem Management. login Usenix Mag. 42(4) (2017) - [c12]Taejoong Chung, Roland van Rijswijk-Deij, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson:
Understanding the role of registrars in DNSSEC deployment. Internet Measurement Conference 2017: 369-383 - [c11]Luuk Hendriks, Ricardo de Oliveira Schmidt, Roland van Rijswijk-Deij, Aiko Pras:
On the Potential of IPv6 Open Resolvers for DDoS Attacks. PAM 2017: 17-29 - [c10]Roland van Rijswijk-Deij, Taejoong Chung, David R. Choffnes, Alan Mislove, Willem Toorop:
The Root Canary: Monitoring and Measuring the DNSSEC Root Key Rollover. SIGCOMM Posters and Demos 2017: 63-64 - [c9]Anna Sperotto, Olivier van der Toorn, Roland van Rijswijk-Deij:
TIDE: Threat Identification Using Active DNS Measurements. SIGCOMM Posters and Demos 2017: 65-67 - [c8]Taejoong Chung, Roland van Rijswijk-Deij, Balakrishnan Chandrasekaran, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson:
A Longitudinal, End-to-End View of the DNSSEC Ecosystem. USENIX Security Symposium 2017: 1307-1322 - 2016
- [j3]Jeroen van der Ham, Roland van Rijswijk-Deij:
Ethics and Internet Measurements. J. Cyber Secur. Mobil. 5(4): 287-308 (2016) - [j2]Roland van Rijswijk-Deij, Mattijs Jonker, Anna Sperotto, Aiko Pras:
A High-Performance, Scalable Infrastructure for Large-Scale Active DNS Measurements. IEEE J. Sel. Areas Commun. 34(6): 1877-1888 (2016) - [c7]Roland van Rijswijk-Deij, Mattijs Jonker, Anna Sperotto:
On the adoption of the elliptic curve digital signature algorithm (ECDSA) in DNSSEC. CNSM 2016: 258-262 - [c6]Mattijs Jonker, Anna Sperotto, Roland van Rijswijk-Deij, Ramin Sadre, Aiko Pras:
Measuring the Adoption of DDoS Protection Services. Internet Measurement Conference 2016: 279-285 - 2015
- [j1]Roland van Rijswijk-Deij, Anna Sperotto, Aiko Pras:
Making the Case for Elliptic Curves in DNSSEC. Comput. Commun. Rev. 45(5): 13-19 (2015) - [c5]José Jair Santanna, Roland van Rijswijk-Deij, Rick Hofstede, Anna Sperotto, Mark Wierbosch, Lisandro Zambenedetti Granville, Aiko Pras:
Booters - An analysis of DDoS-as-a-service attacks. IM 2015: 243-251 - [c4]Roland van Rijswijk-Deij, Mattijs Jonker, Anna Sperotto, Aiko Pras:
The Internet of Names: A DNS Big Dataset. SIGCOMM 2015: 91-92 - 2014
- [c3]Roland van Rijswijk-Deij, Anna Sperotto, Aiko Pras:
DNSSEC and its potential for DDoS attacks: a comprehensive measurement study. Internet Measurement Conference 2014: 449-460 - [c2]Sven Dietrich, Jeroen van der Ham, Aiko Pras, Roland van Rijswijk-Deij, Darren Shou, Anna Sperotto, Aimee van Wynsberghe, Lenore D. Zuck:
Ethics in Data Sharing: Developing a Model for Best Practice. IEEE Symposium on Security and Privacy Workshops 2014: 5-9 - 2013
- [c1]Roland van Rijswijk-Deij, Erik Poll:
Using Trusted Execution Environments in Two-factor Authentication: comparing approaches. Open Identity Summit 2013: 20-31
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint