Follow
Hadi Asghari
Hadi Asghari
Humboldt Institute for Internet and Society
Verified email at hiig.de - Homepage
Title
Cited by
Cited by
Year
The role of internet service providers in botnet mitigation an empirical analysis based on spam data
M Van Eeten, J Bauer, H Asghari, S Tabatabaie, D Rand
OECD Publishing, 2010
1342010
Deep packet inspection and bandwidth management: Battles over BitTorrent in Canada and the United States
ML Mueller, H Asghari
Telecommunications Policy, 2012
832012
Post-mortem of a zombie: Conficker cleanup after six years
H Asghari, M Ciere, MJG Van Eeten
24th {USENIX} Security Symposium ({USENIX} Security 15), 1-16, 2015
522015
Security Collapse in the HTTPS Market: Assessing legal and technical solutions to secure HTTPS
A Arnbak, H Asghari, M Van Eeten, N Van Eijk
Queue 12 (8), 30-43, 2014
472014
Economics of fighting botnets: Lessons from a decade of mitigation
H Asghari, MJG Van Eeten, JM Bauer
IEEE Security & Privacy 13 (5), 16-23, 2015
462015
Security economics in the HTTPS value chain
H Asghari, M Van Eeten, A Arnbak, NANM van Eijk
Twelfth Workshop on the Economics of Information Security (WEIS 2013 …, 2013
392013
How dynamic is the isps address space? towards internet-wide dhcp churn estimation
GCM Moura, C Ganán, Q Lone, P Poursaied, H Asghari, M van Eeten
2015 IFIP Networking Conference (IFIP Networking), 1-9, 2015
372015
The Impact of User Location on Cookie Notices (Inside and Outside of the European Union)
R Van Eijk, H Asghari, P Winter, A Narayanan
IEEE Workshop on Technology and Consumer Protection (ConPro’19)., 2019
35*2019
Why them? Extracting intelligence about target selection from Zeus financial malware
ST Tajalizadehkhoob, H Asghari, C Gañán, MJG Van Eeten
Proceedings of the 13th Annual Workshop on the Economics of Information …, 2014
282014
Internet service providers and botnet mitigation: a fact-finding study on the Dutch market
MJG van Eeten, H Asghari, JM Bauer, S Tabatabaie
262011
Responsibility for Data Protection in a Networked World: On the Question of the Controller, Effective and Complete Protection and Its Application to Data Access Rights in Europe
R Mahieu, J Van Hoboken, H Asghari
J. Intell. Prop. Info. Tech. & Elec. Com. L. 10, 84, 2019
252019
Collectively exercising the right of access: individual effort, societal effect
R Mahieu, H Asghari, M van Eeten
Internet Policy Review 7 (3), 2018
252018
Using crowdsourcing marketplaces for network measurements: The case of spoofer
Q Lone, M Luckie, M Korczyński, H Asghari, M Javed, M Van Eeten
2018 Network Traffic Measurement and Analysis Conference (TMA), 1-8, 2018
172018
Unravelling the Economic and Political Drivers of Deep Packet Inspection
H Asghari, M van Eeten, M Mueller
172012
Estimating the size of the iceberg from its tip: An investigation into unreported data breach notifications
F Bisogni, H Asghari, M van Eeten
16th Annual Workshop on the Economics of Information Security, 54, 2017
16*2017
Botnet mitigation and the role of ISPs: A quantitative study into the role and incentives of Internet Service Providers in combating botnet propagation and activity
H Asghari
Delft University of Technology., 2010
16*2010
Dimensioning the Elephant: An Empirical Analysis of the Ipv4 Transfer Market
M Mueller, B Kuerbis, H Asghari
Available at SSRN 2016483, 2012
15*2012
pyasn–Python IP address to autonomous system number lookup module
H Asghari
URL: https://github. com/hadiasghari/pyasn (Cited on p. 12), 0
12
Evaluating the impact of AbuseHUB on botnet mitigation
M van Eeten, Q Lone, G Moura, H Asghari, M Korczyński
arXiv preprint arXiv:1612.03101, 2016
112016
Deep Packet Inspection: Effects of Regulation on Its Deployment by Internet Providers
H Asghari, M Van Eeten, JM Bauer, M Mueller
TPRC, 2013
112013
The system can't perform the operation now. Try again later.
Articles 1–20