Srdjan Matic

Orcid: 0000-0003-2822-3970

According to our database1, Srdjan Matic authored at least 15 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
The Rise of GoodFATR: A Novel Accuracy Comparison Methodology for Indicator Extraction Tools.
Future Gener. Comput. Syst., July, 2023

Your Code is 0000: An Analysis of the Disposable Phone Numbers Ecosystem.
Proceedings of the 7th Network Traffic Measurement and Analysis Conference, 2023

In the Room Where It Happens: Characterizing Local Communication and Threats in Smart Homes.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

2022
GoodFATR: A Platform for Automated Threat Report Collection and IOC Extraction.
CoRR, 2022

Measuring Web Cookies in Governmental Websites.
Proceedings of the WebSci '22: 14th ACM Web Science Conference 2022, Barcelona, Spain, June 26, 2022

Deep dive into the IoT backend ecosystem.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

Towards an extensible privacy analysis framework for smart homes.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

Challenges in inferring privacy properties of smart devices: towards scalable multi-vantage point testing methods.
Proceedings of the 3rd International CoNEXT Student Workshop, 2022

2020
Identifying Sensitive URLs atWeb-Scale.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

2019
PYTHIA: a Framework for the Automated Analysis of Web Hosting Environments.
Proceedings of the World Wide Web Conference, 2019

2017
Active techniques for revealing and analyzing the security of hidden servers.
PhD thesis, 2017

Dissecting Tor Bridges: A Security Evaluation of their Private and Public Infrastructures.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

2015
CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden Services.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Certified PUP: Abuse in Authenticode Code Signing.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2012
Peering into the Muddy Waters of Pastebin.
ERCIM News, 2012


  Loading...