Haya Schulmann
Orcid: 0000-0002-8130-0472Affiliations:
- Goethe University Frankfurt, Frankfurt am Main, Germany
- National Research Center for Applied Cybersecurity ATHENE, Germany
According to our database1,
Haya Schulmann
authored at least 128 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
ACM Trans. Priv. Secur., November, 2024
Datenschutz und Datensicherheit (dud), January, 2024
Attacking with Something That Does Not Exist: Low-Rate Flood with 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU.
CoRR, 2024
Attacking with Something That Does Not Exist: 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU.
Proceedings of the 18th USENIX WOOT Conference on Offensive Technologies, 2024
Proceedings of the Passive and Active Measurement - 25th International Conference, 2024
Proceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 23rd ACM Workshop on Hot Topics in Networks, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Proceedings of the 2024 Applied Networking Research Workshop, 2024
2023
PACMNET, 2023
Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the ACM SIGCOMM 2023 Conference, 2023
Proceedings of the ACM SIGCOMM 2023 Conference, 2023
Proceedings of the ACM SIGCOMM 2023 Conference, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the ACM SIGCOMM 2021 Conference, Virtual Event, USA, August 23-27, 2021., 2021
PrivInferVis: Towards Enhancing Transparency over Attribute Inference in Online Social Networks.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
Poster: WallGuard - A Deep Learning Approach for Avoiding Regrettable Posts in Social Media.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the ANRW '21: Applied Networking Research Workshop, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020
Proceedings of the ANRW '20: Applied Networking Research Workshop, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 31. Krypto-Tag, Berlin, Germany, October 17-18, 2019, 2019
Proceedings of the 30. Krypto-Tag, Berlin, Germany, March 28-29, 2019, 2019
Proceedings of the 30. Krypto-Tag, Berlin, Germany, March 28-29, 2019, 2019
2018
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018
Proceedings of the 17th ACM Workshop on Hot Topics in Networks, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the Posters and Demos Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet.
Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2017) - Volume 3: IVAPP, Porto, Portugal, February 27, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Traffic Monitoring and Analysis - 8th International Workshop, 2016
Proceedings of the 2016 IEEE International Conference on Software Science, 2016
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
2015
IEEE Internet Comput., 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
2014
Ethical Considerations when Employing Fake Identities in Online Social Networks for Research.
Sci. Eng. Ethics, 2014
IEEE Internet Comput., 2014
IEEE Secur. Priv., 2014
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
IACR Cryptol. ePrint Arch., 2013
CoRR, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the CCSW'13, 2013
Proceedings of the Annual Computer Security Applications Conference, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
Proceedings of the Security and Privacy in Communication Networks, 2011
2010
Proceedings of the Network and Distributed System Security Symposium, 2010
2009
2008