Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TANGLED: A Cooperative Anycast Testbed., , , , , , and . IM, page 766-771. IEEE, (2021)Anycast Agility: Network Playbooks to Fight DDoS., , , and . USENIX Security Symposium, page 4201-4218. USENIX Association, (2022)Forecasting the Impact of IXP Outages Using Anycast., , , and . TMA, IFIP, (2021)MikroTik Devices Landscape, Realistic Honeypots, and Automated Attack Classification., , , and . NOMS, page 1-9. IEEE, (2020)Are Darknets All The Same? On Darknet Visibility for Security Monitoring., , , , , and . LANMAN, page 1-6. IEEE, (2019)Characterising attacks targeting low-cost routers: a MikroTik case study (Extended)., , , , and . CoRR, (2020)Online Discoverability and Vulnerabilities of ICS/SCADA Devices in the Netherlands., , , and . CoRR, (2020)MARS: uma arquitetura para análise de malwares utilizando SDN., , and . SBRC Companion, (2018)Old but Gold: Prospecting TCP to Engineer and Live Monitor DNS Anycast., , , , , , and . PAM, volume 13210 of Lecture Notes in Computer Science, page 264-292. Springer, (2022)On the Asymmetry of Internet eXchange Points -Why Should IXPs and CDNs Care?, , , , , and . CNSM, page 73-81. IEEE, (2022)