Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NetworkProfiler: Towards automatic fingerprinting of Android apps., , , , and . INFOCOM, page 809-817. IEEE, (2013)A Social Network Based Patching Scheme for Worm Containment in Cellular Networks., , , , and . INFOCOM, page 1476-1484. IEEE, (2009)Characterizing Data Services in a 3G Network: Usage, Mobility and Access Issues., , , and . ICC, page 1-6. IEEE, (2011)Design of fault-tolerant logical topologies in wavelength-routed optical IP networks., , , , and . GLOBECOM, page 2098-2103. IEEE, (2001)Scheduling algorithms for multicast traffic in TDM/WDM networks with arbitrary tuning latencies., , , , and . Comput. Networks, 41 (6): 727-742 (2003)Poster: telephony network characterization for spammer identification., , , and . SIGMETRICS Perform. Evaluation Rev., 39 (2): 69 (2011)Optimal NetFlow Deployment in IP Networks, and . page 1245-1254. (2005)Understanding Mobile App Usage Patterns Using In-App Advertisements., , , and . PAM, volume 7799 of Lecture Notes in Computer Science, page 63-72. Springer, (2013)Logical topologies design over WDM wavelength routed networks robust to traffic uncertainties., , , and . IEEE Communications Letters, 5 (4): 172-174 (2001)Robust and efficient detection of DDoS attacks for large-scale internet., , , , and . Comput. Networks, 51 (18): 5036-5056 (2007)