Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting anomalies in massive traffic with sketches., , , and . CFI, page 14:1-14:2. ACM, (2014)The STRIDE Towards IPv6: A Comprehensive Threat Model for IPv6 Transition Technologies., , , , and . ICISSP, page 243-254. SciTePress, (2016)How much can we survive on an IPv6 network?: experience on the IPv6 only connectivity with NAT64/DNS64 at WIDE camp 2011 Autumn., , , , , and . AINTEC, page 144-151. ACM, (2011)SPS: A Simple Filtering Algorithm to Thwart Phishing Attacks., , and . AINTEC, volume 3837 of Lecture Notes in Computer Science, page 195-209. Springer, (2005)Detecting Methods of Virus Email Based on Mail Header and Encoding Anomaly., , and . ICONIP (1), volume 5506 of Lecture Notes in Computer Science, page 547-554. Springer, (2008)Adaptive Bloom Filter: A Space-Efficient Counting Algorithm for Unpredictable Network Traffic, , and . IEICE - Trans. Inf. Syst., E91-D (5): 1292--1299 (2008)Detecting Anomalies in Massive Traffic Streams Based on S-Transform Analysis of Summarized Traffic Entropies., , , and . IEICE Trans. Inf. Syst., 98-D (3): 588-595 (2015)Experiences in emulating 10K AS topology with massive VM multiplexing., , , , , , and . VISA, page 97-104. ACM, (2009)EtherPIPE: an ethernet character device for network scripting., , , , and . HotSDN, page 61-66. ACM, (2013)An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites., , and . ICONIP (1), volume 5506 of Lecture Notes in Computer Science, page 539-546. Springer, (2008)