Expertises

  • Computer Science

    • Data Services
    • Domain Name
    • Malicious Activity
    • Malicious Actor
    • Malicious Intent
    • Malware
    • Phishing Attack
    • spam

Organisaties

Publicaties

2025

Victimization in DDoS attacks: The role of popularity and industry sector (2025)Journal of information security and applications, 94. Article 104242. Haq, M. Y. M., Affinito, A., Botta, A., Sperotto, A., Nieuwenhuis, L. J. M., Jonker, M. & Abhishta, A.https://doi.org/10.1016/j.jisa.2025.10424290th Minute: A First Look to Collateral Damages and Efficacy of the Italian Piracy Shield (2025)In 2025 21th International Conference on Network and Service Management (CNSM). IEEE (Accepted/In press). Sommese, R., Sperotto, A., Prado, A., van der Ham, J. & Affinito, A.To Block Or Not To Block?: Evaluating Parental Controls Across Routers, DNS Services, and Software (2025)In Network Traffic Measurement and Analysis Conference 2025 (TMA'2025). International Federation for Information Processing (IFIP). Liberato, M., Affinito, A., Meijerink, B., Jonker, M., Botta, A. & Sperotto, A.

2024

DarkDNS: Revisiting the Value of Rapid Zone Update (2024)In IMC 2024 - Proceedings of the 2024 ACM Internet Measurement Conference (pp. 454-461) (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC; Vol. 2024). Association for Computing Machinery (ACM). Sommese, R., Akiwate, G., Affinito, A., Muller, M., Jonker, M. & Claffy, K. C.https://doi.org/10.1145/3646547.3689021Victimization in DDoS Attacks: The Role of Popularity and Industry Sector (2024)[Working paper › Preprint]. Social Science Research Network (SSRN) (E-pub ahead of print/First online). Haq, M. Y. M., Affinito, A., Botta, A., Sperotto, A., Nieuwenhuis, L. J. M., Jonker, M. & Abhishta, A.https://doi.org/10.2139/ssrn.4970423DarkDNS: Revisiting the Value of Rapid Zone Update (2024)[Working paper › Preprint]. ArXiv.org. Sommese, R., Akiwate, G., Affinito, A., Muller, M., Jonker, M. & Claffy, K. C.https://doi.org/10.48550/arXiv.2405.12010Analyzing Privacy Implications of Mobile Apps Data Collection across Age Groups (2024)In Proceedings of the 2024 20th International Conference on Network and Service Management (CNSM): AI-Powered Network and Service Management for Tomorrow's Digital World (Proceedings International Conference on Network and Service Management (CNSM); Vol. 2024). IEEE. Mariani, A., Liberato, M., Sperotto, A. & Affinito, A.https://doi.org/10.23919/CNSM62983.2024.10814597

2022

Where .ru?: assessing the impact of conflict on russian domain infrastructure (2022)In Proceedings of the 22nd ACM Internet Measurement Conference (pp. 159-165). Association for Computing Machinery. Jonker, M., Akiwate, G., Affinito, A., Claffy, K., Botta, A., Voelker, G. M., van Rijswijk - Deij, R. M. & Savage, S.https://doi.org/10.1145/3517745.3561423Domain Name Lifetimes: Baseline and Threats (2022)In Proceedings of the 6th edition of the Network Traffic Measurement and Analysis Conference (TMA Conference 2022). International Federation for Information Processing (IFIP). Affinito, A., Sommese, R., Akiwate, G., Savage, S., Claffy, K., Voelker, G. M., Botta, A. & Jonker, M.https://tma.ifip.org/2022/wp-content/uploads/sites/11/2022/06/tma2022-paper32.pdf

Onderzoeksprofielen

Scan de QR-code of
Download vCard