Searched for: author%3A%22Asghari%2C+H.%22
(1 - 9 of 9)
document
Van Eijk, Rob (author), Asghari, H. (author), Winter, Philipp (author), Narayanan, Arvind (author)
The web is global, but privacy laws differ by country. Which set of privacy rules do websites follow? We empirically study this question by detecting and analyzing cookie notices in an automated way. We crawl 1,500 European, American,and Canadian websites from each of 18 countries. We detect cookie notices on 40% of websites in our sample. We...
conference paper 2019
document
Pudane, B. (author), Rataj, Michal (author), Molin, E.J.E. (author), Mouter, N. (author), Asghari, H. (author), van Cranenburgh, S. (author), Chorus, C.G. (author)
conference paper 2018
document
Lone, Q.B. (author), Luckie, Matthew (author), Korczyński, MacIej (author), Asghari, H. (author), Javed, Mobin (author), van Eeten, M.J.G. (author)
Internet measurement tools are used to make inferences about network policies and practices across the Internet, such as censorship, traffic manipulation, bandwidth, and security measures. Some tools must be run from vantage points within individual networks, so are dependent on volunteer recruitment. A small pool of volunteers limits the...
conference paper 2018
document
Bisogni, F. (author), Asghari, H. (author), van Eeten, M.J.G. (author)
conference paper 2017
document
Asghari, H. (author), Mahieu, R.L.P. (author), Mittal, Prateek (author), Greenstadt, Rachel (author)
conference paper 2017
document
Asghari, H. (author), Ciere, M. (author), Van Eeten, M.J.G. (author)
Research on botnet mitigation has focused predominantly on methods to technically disrupt the commandand-control infrastructure. Much less is known about the effectiveness of large-scale efforts to clean up infected machines. We analyze longitudinal data from the sinkhole of Conficker, one the largest botnets ever seen, to assess the impact of...
conference paper 2015
document
Moreira Moura, G.C. (author), Ganan, C.H.G. (author), Lone, Q.B. (author), Poursaied, P. (author), Asghari, H. (author), Van Eeten, M.J.G. (author)
IP address counts are typically used as a surrogate metric for the number of hosts in a network, as in the case of ISP rankings based on botnet infected addresses. However, due to effects of dynamic IP address allocation, such counts tend to overestimate the number of hosts, sometimes by an order of magnitude. In the literature, the rate at...
conference paper 2015
document
Tajalizadehkhoob, S.T. (author), Asghari, H. (author), Ganan, C. (author), Van Eeten, M.J.G. (author)
conference paper 2014
document
Asghari, H. (author), Van Eeten, M.J.G. (author), Mueller, M. (author)
Large and impressive data collection efforts often fail to make their data useful for answering policy questions. In this paper, we argue that this is due to a systematic gap between the ways measurement engineers think about their data, and how other disciplines typically make use of data. We recap our own efforts to use the data generated by a...
conference paper 2013
Searched for: author%3A%22Asghari%2C+H.%22
(1 - 9 of 9)