Follow
Hadi Asghari
Hadi Asghari
Humboldt Institute for Internet and Society
Verified email at hiig.de - Homepage
Title
Cited by
Cited by
Year
The role of internet service providers in botnet mitigation an empirical analysis based on spam data
M Van Eeten, J Bauer, H Asghari, S Tabatabaie, D Rand
OECD Publishing, 2010
1272010
Deep packet inspection and bandwidth management: Battles over BitTorrent in Canada and the United States
ML Mueller, H Asghari
Telecommunications Policy, 2012
872012
{Post-Mortem} of a Zombie: Conficker Cleanup After Six Years
H Asghari, M Ciere, MJG Van Eeten
24th USENIX Security Symposium (USENIX Security 15), 1-16, 2015
512015
Security Collapse in the HTTPS Market: Assessing legal and technical solutions to secure HTTPS
A Arnbak, H Asghari, M Van Eeten, N Van Eijk
Queue 12 (8), 30-43, 2014
462014
Economics of fighting botnets: Lessons from a decade of mitigation
H Asghari, MJG Van Eeten, JM Bauer
IEEE Security & Privacy 13 (5), 16-23, 2015
422015
Security economics in the HTTPS value chain
H Asghari, M Van Eeten, A Arnbak, NANM van Eijk
Twelfth Workshop on the Economics of Information Security (WEIS 2013 …, 2013
382013
Internet service providers and botnet mitigation: a fact-finding study on the Dutch market
MJG van Eeten, H Asghari, JM Bauer, S Tabatabaie
332011
How dynamic is the isps address space? towards internet-wide dhcp churn estimation
GCM Moura, C Ganán, Q Lone, P Poursaied, H Asghari, M van Eeten
2015 IFIP Networking Conference (IFIP Networking), 1-9, 2015
302015
Why them? Extracting intelligence about target selection from Zeus financial malware
ST Tajalizadehkhoob, H Asghari, C Gañán, MJG Van Eeten
Proceedings of the 13th Annual Workshop on the Economics of Information …, 2014
292014
The Impact of User Location on Cookie Notices (Inside and Outside of the European Union)
R Van Eijk, H Asghari, P Winter, A Narayanan
IEEE Workshop on Technology and Consumer Protection (ConPro’19)., 2019
26*2019
Responsibility for Data Protection in a Networked World: On the Question of the Controller, Effective and Complete Protection and Its Application to Data Access Rights in Europe
R Mahieu, J Van Hoboken, H Asghari
J. Intell. Prop. Info. Tech. & Elec. Com. L. 10, 84, 2019
232019
Botnet mitigation and the role of ISPs: A quantitative study into the role and incentives of Internet Service Providers in combating botnet propagation and activity
H Asghari
Delft University of Technology., 2010
18*2010
Collectively exercising the right of access: individual effort, societal effect
R Mahieu, H Asghari, M van Eeten
Internet Policy Review 7 (3), 2018
172018
Unravelling the Economic and Political Drivers of Deep Packet Inspection
H Asghari, M van Eeten, M Mueller
162012
Using crowdsourcing marketplaces for network measurements: The case of spoofer
Q Lone, M Luckie, M Korczyński, H Asghari, M Javed, M Van Eeten
2018 Network Traffic Measurement and Analysis Conference (TMA), 1-8, 2018
152018
Dimensioning the Elephant: An Empirical Analysis of the Ipv4 Transfer Market
M Mueller, B Kuerbis, H Asghari
Available at SSRN 2016483, 2012
13*2012
Estimating the size of the iceberg from its tip: An investigation into unreported data breach notifications
F Bisogni, H Asghari, M van Eeten
16th Annual Workshop on the Economics of Information Security, 54, 2017
12*2017
Deep Packet Inspection: Effects of Regulation on Its Deployment by Internet Providers
H Asghari, M Van Eeten, JM Bauer, M Mueller
TPRC, 2013
122013
Evaluating the impact of AbuseHUB on botnet mitigation
M van Eeten, Q Lone, G Moura, H Asghari, M Korczyński
arXiv preprint arXiv:1612.03101, 2016
102016
pyasn–Python IP address to autonomous system number lookup module
H Asghari
URL: https://github. com/hadiasghari/pyasn (Cited on p. 12), 0
10
The system can't perform the operation now. Try again later.
Articles 1–20