Roland van Rijswijk-Deij

Orcid: 0000-0002-0249-8776

According to our database1, Roland van Rijswijk-Deij authored at least 69 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
This Is a Local Domain: On Amassing Country-Code Top-Level Domains from Public Data.
Comput. Commun. Rev., April, 2024

WetLinks: A Large-Scale Longitudinal Starlink Dataset with Contiguous Weather Data.
Proceedings of the 8th Network Traffic Measurement and Analysis Conference, 2024

Exploring the Benefit of Path Plausibility Algorithms in BGP.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

ERAFL: Efficient Resource Allocation for Federated Learning Training in Smart Homes.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

IRRedicator: Pruning IRR with RPKI-Valid BGP Insights.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

An Empirical Characterization of Anycast Convergence Time.
Proceedings of the 2024 Applied Networking Research Workshop, 2024

2023
rpkiller: Threat Analysis of the BGP Resource Public Key Infrastructure.
DTRAP, 2023

Your Vulnerability Disclosure Is Important To Us: An Analysis of Coordinated Vulnerability Disclosure Responses Using a Real Security Issue.
CoRR, 2023

Stranger VPNs: Investigating the Geo-Unblocking Capabilities of Commercial VPN Providers.
Proceedings of the Passive and Active Measurement - 24th International Conference, 2023

Advancing in Reverse: A Comprehensive Characterization of IN-ADDR.ARPA Deployment.
Proceedings of the 18th Asian Internet Engineering Conference, 2023

2022
An Empirical View on Consolidation of the Web.
ACM Trans. Internet Techn., 2022

Addressing the challenges of modern DNS a comprehensive tutorial.
Comput. Sci. Rev., 2022

Rpkiller: Threat Analysis from an RPKI Relying Party Perspective.
CoRR, 2022

Improving Proximity Estimation for Contact Tracing using a Multi-channel Approach.
CoRR, 2022

Under the Hood of DANE Mismanagement in SMTP.
Proceedings of the 31st USENIX Security Symposium, 2022

Studie über das Gefahrenpotential und Gegenmaßnahmen zu Angriffen auf das DNS Protokoll durch IP-Fragmentierung.
Proceedings of the Sicherheit, 2022

Mirrors in the Sky: On the Potential of Clouds in DNS Reflection-based Denial-of-Service Attacks.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

A Matter of Degree: Characterizing the Amplification Power of Open DNS Resolvers.
Proceedings of the Passive and Active Measurement - 23rd International Conference, 2022

Improving Proximity Classification for Contact Tracing using a Multi-channel Approach.
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022

Saving Brian's privacy: the perils of privacy exposure through reverse DNS.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

Investigating the impact of DDoS attacks on DNS infrastructure.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

Where .ru?: assessing the impact of conflict on russian domain infrastructure.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

No Time for Downtime: Understanding Post-Attack Behaviors by Customers of Managed DNS Providers.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

On the Asymmetry of Internet eXchange Points -Why Should IXPs and CDNs Care?
Proceedings of the 18th International Conference on Network and Service Management, 2022

2021
Characterization of Anycast Adoption in the DNS Authoritative Infrastructure.
Proceedings of the 5th Network Traffic Measurement and Analysis Conference, 2021

Forecasting the Impact of IXP Outages Using Anycast.
Proceedings of the 5th Network Traffic Measurement and Analysis Conference, 2021

TANGLED: A Cooperative Anycast Testbed.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

ANYway: Measuring the Amplification DDoS Potential of Domains.
Proceedings of the 17th International Conference on Network and Service Management, 2021

2020
Recommendations for DNS Privacy Service Operators.
RFC, October, 2020

Passive Observations of a Large DNS Service: 2.5 Years in the Life of Google.
IEEE Trans. Netw. Serv. Manag., 2020

A Responsible Internet to Increase Trust in the Digital World.
J. Netw. Syst. Manag., 2020

Retrofitting post-quantum cryptography in internet protocols: a case study of DNSSEC.
Comput. Commun. Rev., 2020

A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email.
Proceedings of the 29th USENIX Security Symposium, 2020

When Parents and Children Disagree: Diving into DNS Delegation Inconsistency.
Proceedings of the Passive and Active Measurement - 21st International Conference, 2020

Global-Scale Anycast Network Management with Verfploeter.
Proceedings of the NOMS 2020, 2020

MAnycast2: Using Anycast to Measure Anycast.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

The Reality of Algorithm Agility: Studying the DNSSEC Algorithm Life-Cycle.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

TXTing 101: Finding Security Issues in the Long Tail of DNS TXT Records.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

The Forgotten Side of DNS: Orphan and Abandoned Records.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Evaluating RPKI ROV identification methodologies in automatically generated mininet topologies.
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020

BGP Anycast Tuner: Intuitive Route Management for Anycast Services.
Proceedings of the 16th International Conference on Network and Service Management, 2020

2019
Rolling With Confidence: Managing the Complexity of DNSSEC Operations.
IEEE Trans. Netw. Serv. Manag., 2019

A First Look at QNAME Minimization in the Domain Name System.
Proceedings of the Passive and Active Measurement - 20th International Conference, 2019

Roll, Roll, Roll your Root: A Comprehensive Analysis of the First Ever DNSSEC Root KSK Rollover.
Proceedings of the Internet Measurement Conference, 2019

RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins.
Proceedings of the Internet Measurement Conference, 2019

Privacy-Conscious Threat Intelligence Using DNSBloom.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

2018
A First Look at Certification Authority Authorization (CAA).
Comput. Commun. Rev., 2018

Measuring the impact of a successful DDoS attack on the customer behaviour of managed DNS service providers.
Comput. Commun. Rev., 2018

Melting the snow: Using active DNS measurements to detect snowshoe spam domains.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Economic incentives on DNSSEC deployment: Time to move from quantity to quality.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Measuring Adoption of Security Additions to the HTTPS Ecosystem.
Proceedings of the Applied Networking Research Workshop, 2018

Towards an Independent and Resilient DNS.
Proceedings of the 12th International Conference on Autonomous Infrastructure, 2018

2017
An End-to-End View of DNSSEC Ecosystem Management.
login Usenix Mag., 2017

The Performance Impact of Elliptic Curve Cryptography on DNSSEC Validation.
IEEE/ACM Trans. Netw., 2017

A Longitudinal, End-to-End View of the DNSSEC Ecosystem.
Proceedings of the 26th USENIX Security Symposium, 2017

TIDE: Threat Identification Using Active DNS Measurements.
Proceedings of the Posters and Demos Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

The Root Canary: Monitoring and Measuring the DNSSEC Root Key Rollover.
Proceedings of the Posters and Demos Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

On the Potential of IPv6 Open Resolvers for DDoS Attacks.
Proceedings of the Passive and Active Measurement - 18th International Conference, 2017

Understanding the role of registrars in DNSSEC deployment.
Proceedings of the 2017 Internet Measurement Conference, 2017

2016
A High-Performance, Scalable Infrastructure for Large-Scale Active DNS Measurements.
IEEE J. Sel. Areas Commun., 2016

Ethics and Internet Measurements.
J. Cyber Secur. Mobil., 2016

Measuring the Adoption of DDoS Protection Services.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

On the adoption of the elliptic curve digital signature algorithm (ECDSA) in DNSSEC.
Proceedings of the 12th International Conference on Network and Service Management, 2016

2015
Making the Case for Elliptic Curves in DNSSEC.
Comput. Commun. Rev., 2015

The Internet of Names: A DNS Big Dataset.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

Booters - An analysis of DDoS-as-a-service attacks.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

2014
Ethics in Data Sharing: Developing a Model for Best Practice.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

DNSSEC and its potential for DDoS attacks: a comprehensive measurement study.
Proceedings of the 2014 Internet Measurement Conference, 2014

2013
Using Trusted Execution Environments in Two-factor Authentication: comparing approaches.
Proceedings of the Open Identity Summit 2013, September 9th, 2013


  Loading...