If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where A. Noroozian is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 6 Similar Profiles

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

  • 11 Conference contribution
  • 1 Chapter
  • 1 Dissertation (TU Delft)

Evaluating Hosting Provider Security Through Abuse Data and the Creation of Metrics

Noroozian, A., 2020, 204 p.

Research output: ThesisDissertation (TU Delft)

Open Access
File
  • 43 Downloads (Pure)

    Go See a Specialist? Predicting Cybercrime Sales on Online Anonymous Markets from Vendor and Product Characteristics

    van Wegberg, R., Miedema, F., Akyazi, U., Noroozian, A., Klievink, B. & van Eeten, M., 2020, Proceedings of The Web Conference (WWW). Association for Computing Machinery (ACM), p. 816-826 11 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
  • 36 Downloads (Pure)

    Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting

    Noroozian, A., Koenders, J., van Veldhuizen, E., Hernandez Ganan, C., Alrwais, S., McCoy, D. & van Eeten, M., 2019, 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, p. 1341--1356

    Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientificpeer-review

    Open Access
    File
  • 88 Downloads (Pure)

    Cybercrime after the sunrise: A statistical analysis of DNS abuse in new gTLDs

    Korczyński, M., Wullink, M., Tajalizadehkhoob, S., Moura, G. C. M., Noroozian, A., Bagley, D. & Hesselman, C., 29 May 2018, ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 609-623 15 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • 6 Citations (Scopus)

    Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting

    Tajalizadehkhoob, S., Van Goethem, T., Korczynski, M., Noroozian, A., Böhme, R., Moore, T., Joosen, W. & van Eeten, M., 3 Nov 2017, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security . Association for Computing Machinery (ACM), p. 553-567

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
  • 7 Citations (Scopus)
    46 Downloads (Pure)