Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Contention-Aware Performance Prediction For Virtualized Network Functions., , , and . SIGCOMM, page 270-282. ACM, (2020)Verifiable resource accounting for cloud computing services., and . CCSW, page 21-26. ACM, (2011)Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration., , and . ACM Conference on Computer and Communications Security, page 1595-1606. ACM, (2015)KalKi: A Software-Defined IoT Security Platform., , , , , , , , and . WF-IoT, page 1-6. IEEE, (2020)Analyzing Third Party Service Dependencies in Modern Web Services: Have We Learned from the Mirai-Dyn Incident?, , and . Internet Measurement Conference, page 634-647. ACM, (2020)Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things., , , , and . HotNets, page 5:1-5:7. ACM, (2015)CANNON: Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers., , , and . SP, page 195-210. IEEE, (2021)On the Security of Thread Networks: Experimentation with OpenThread-Enabled Devices., , and . WISEC, page 233-244. ACM, (2022)Understanding the impact of video quality on user engagement., , , , , , , and . SIGCOMM, page 362-373. ACM, (2011)A Control-Theoretic Approach for Dynamic Adaptive Video Streaming over HTTP., , , and . SIGCOMM, page 325-338. ACM, (2015)