Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machine learning, data mining and Big Data frameworks for network monitoring and troubleshooting., , , and . Comput. Networks, (2016)Should You Use the App for That?: Comparing the Privacy Implications of App- and Web-based Online Services., , , and . Internet Measurement Conference, page 365-372. ACM, (2016)Measuring and Applying Invalid SSL Certificates: The Silent Majority., , , , , , and . Internet Measurement Conference, page 527-541. ACM, (2016)Not Your Average App: A Large-scale Privacy Analysis of Android Browsers., , , , , , and . Proc. Priv. Enhancing Technol., 2023 (1): 29-46 (January 2023)BehavIoT: Measuring Smart Home IoT Behavior Using Network-Inferred Behavior Models., , and . IMC, page 421-436. ACM, (2023)Protected or Porous: A Comparative Analysis of Threat Detection Capability of IoT Safeguards., , , and . SP, page 3061-3078. IEEE, (2023)Information Exposure From Consumer IoT Devices: A Multidimensional, Network-Informed Measurement Approach., , , , , and . Internet Measurement Conference, page 267-279. ACM, (2019)Analysis of SSL certificate reissues and revocations in the wake of heartbleed., , , , , , and . Internet Measurement Conference, page 489-502. ACM, (2014)Identifying Traffic Differentiation in Mobile Networks., , , , , , , and . Internet Measurement Conference, page 239-251. ACM, (2015)A Broad View of the Ecosystem of Socially Engineered Exploit Documents., , , , and . NDSS, The Internet Society, (2017)