Author of the publication

All Things Considered: An Analysis of IoT Devices on Home Networks.

, , , , , , , and . USENIX Security Symposium, page 1169-1185. USENIX Association, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Durumeric, Zakir
add a person with the name Durumeric, Zakir
 

Other publications of authors with the same name

Measuring the Security Harm of TLS Crypto Shortcuts., , and . Internet Measurement Conference, page 33-47. ACM, (2016)You've Got Vulnerability: Exploring Effective Vulnerability Notifications., , , , , , , and . USENIX Security Symposium, page 1033-1050. USENIX Association, (2016)Users Really Do Plug in USB Drives They Find., , , , , , and . IEEE Symposium on Security and Privacy, page 306-319. IEEE Computer Society, (2016)Scanning the Internet for Liveness., , , , , , , and . Computer Communication Review, 48 (2): 2-9 (2018)The Matter of Heartbleed., , , , , , , , , and 1 other author(s). Internet Measurement Conference, page 475-488. ACM, (2014)A Search Engine Backed by Internet-Wide Scanning., , , , and . ACM Conference on Computer and Communications Security, page 542-553. ACM, (2015)ZMap: Fast Internet-wide Scanning and Its Security Applications., , and . USENIX Security Symposium, page 605-620. USENIX Association, (2013)An Internet-Wide View of Internet-Wide Scanning., , and . USENIX Security Symposium, page 65-78. USENIX Association, (2014)Towards a Complete View of the Certificate Ecosystem., , , , , and . Internet Measurement Conference, page 543-549. ACM, (2016)Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice., , , , , , , , , and 4 other author(s). ACM Conference on Computer and Communications Security, page 5-17. ACM, (2015)