Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Biases in Data-Driven Networking, and What to Do About Them., , , , and . HotNets, page 192-198. ACM, (2017)Enabling Software-Defined Network Security for Next-Generation Networks.. CoNEXT, page 1. ACM, (2016)CARE: Content Aware Redundancy Elimination for Disaster Communications on Damaged Networks, , , , , and . CoRR, (2012)How to Catch when Proxies Lie: Verifying the Physical Locations of Network Proxies with Active Geolocation., , , , and . Internet Measurement Conference, page 203-217. ACM, (2018)Formalizing an Architectural Model of a Trustworthy Edge IoT Security Gateway‡., , , and . RTCSA, page 93-102. IEEE, (2021)Efficient and Correct Test Scheduling for Ensembles of Network Policies., , , and . NSDI, page 437-452. USENIX Association, (2018)Don't Yank My Chain: Auditable NF Service Chaining., , , , , and . NSDI, page 155-173. USENIX Association, (2021)Simplifying Software-Defined Network Optimization Using SOL., , and . NSDI, page 223-237. USENIX Association, (2016)Watching the watchmen: Least privilege for managed network services., , , and . HotNets, page 147-154. ACM, (2021)Rethinking Virtual Network Embedding in Reconfigurable Networks., , , and . SECON, page 424-432. IEEE, (2018)