Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

20 Years of DDoS: a Call to Action., , and . CoRR, (2019)A Study of Malcode-Bearing Documents., , , , and . DIMVA, volume 4579 of Lecture Notes in Computer Science, page 231-250. Springer, (2007)gore: Routing-Assisted Defense Against DDoS Attacks., , , and . ISC, volume 3650 of Lecture Notes in Computer Science, page 179-193. Springer, (2005)Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification., , , and . STM, volume 7783 of Lecture Notes in Computer Science, page 161-176. Springer, (2012)Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation., , and . ESORICS, volume 6345 of Lecture Notes in Computer Science, page 249-267. Springer, (2010)Your data in your hands: Privacy-preserving user behavior models for context computation., , , and . PerCom Workshops, page 170-175. IEEE, (2017)Attestation & Authentication for USB Communications., and . SERE (Companion), page 43-44. IEEE, (2012)Analysis of Android Applications' Permissions., , , and . SERE (Companion), page 45-46. IEEE, (2012)Mobile Application and Device Power Usage Measurements., , , and . SERE, page 147-156. IEEE, (2012)WebSOS: an overlay-based system for protecting web servers from denial of service attacks., , , , , and . Comput. Networks, 48 (5): 781-807 (2005)