Author of the publication

Time and Space Correlation in BGP Messages.

, , , and . ICOIN, volume 3391 of Lecture Notes in Computer Science, page 215-222. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Synoptic Graphlet: Bridging the Gap Between Supervised and Unsupervised Profiling of Host-Level Network Traffic., , , , , and . IEEE/ACM Trans. Netw., 21 (4): 1284-1297 (2013)Combining multiresolution and random projections for robust statistical analysis and anomaly detection., , , and . AINTEC, page 1-2. ACM, (2009)Simple but efficient collaboration in a complex competitive situation., , , , , and . AAMAS, page 1042-1043. ACM, (2003)Understanding abusive web resources: characteristics and counter-measures of malicious web resources and cryptocurrency mining., , and . AINTEC, page 54-61. ACM, (2018)Robust Peer to Peer Mobile Botnet Detection by Using Communication Patterns., , and . AINTEC, page 38-45. ACM, (2018)A comparison of web privacy protection techniques., , and . Comput. Commun., (2019)Combining Communication Patterns & Traffic Patterns to Enhance Mobile Traffic Identification Performance., , and . J. Inf. Process., 24 (2): 247-254 (2016)Uncovering Relations between Traffic Classifiers and Anomaly Detectors via Graph Theory., , , and . TMA, volume 6003 of Lecture Notes in Computer Science, page 101-114. Springer, (2010)Layer-1 Bandwidth on Demand Services in SINET3., , , , , , , , , and 1 other author(s). GLOBECOM, page 2286-2291. IEEE, (2007)Network application profiling with traffic causality graphs., , , , and . Int. J. Netw. Manag., 24 (4): 289-303 (2014)