Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool's Monitoring System., , , and . USENIX Security Symposium, page 6151-6166. USENIX Association, (2023)SVLAN: Secure & Scalable Network Virtualization., , , and . NDSS, The Internet Society, (2020)PsyBoG: Power spectral density analysis for detecting botnet groups., , , , and . MALWARE, page 85-92. IEEE Computer Society, (2014)Mondrian: Comprehensive Inter-domain Network Zoning Architecture., , , and . NDSS, The Internet Society, (2021)Carbon-Aware Global Routing in Path-Aware Networks., , , and . e-Energy, page 144-158. ACM, (2023)SpeedCam: Towards Efficient Flow Monitoring for Multipath Communication., , and . IM, page 860-865. IEEE, (2021)Analysis of NTP pool monitoring system based on multiple monitoring stations., , and . MobiHoc, page 259-264. ACM, (2022)Hidden Bot Detection by Tracing Non-human Generated Traffic at the Zombie Host., , and . ISPEC, volume 6672 of Lecture Notes in Computer Science, page 343-361. Springer, (2011)DroidGraph: discovering Android malware by analyzing semantic behavior., , , and . CNS, page 498-499. IEEE, (2014)Creating a Secure Underlay for the Internet., , , , , , , , and . USENIX Security Symposium, page 2601-2618. USENIX Association, (2022)