Author of the publication

Intentional Network Monitoring: Finding the Needle without Capturing the Haystack.

, and . HotNets, page 5:1-5:7. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verifying the Correctness of Wide-Area Internet Routing, , and . MIT, (2004)Holding the Internet Accountable., , , , , and . HotNets, ACM SIGCOMM, (2007)The case for an intermediate representation for programmable data planes., and . SOSR, page 3:1-3:6. ACM, (2015)Refactoring network infrastructure to improve manageability: a case study of home networking., and . Comput. Commun. Rev., 42 (3): 54-61 (2012)You, Me, and IoT: How Internet-Connected Home Devices Affect Interpersonal Relationships., , , , and . CSCW Companion, page 142-145. ACM, (2019)Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search., , , , , , and . FOCI, USENIX Association, (2014)Global Measurement of DNS Manipulation., , , , , , and . USENIX Security Symposium, page 307-323. USENIX Association, (2017)How Do Tor Users Interact With Onion Services?, , , , , and . USENIX Security Symposium, page 411-428. USENIX Association, (2018)Measuring the effects of internet path faults on reactive routing., , , and . SIGMETRICS, page 126-137. ACM, (2003)The Effect of DNS on Tor's Anonymity., , , , and . NDSS, The Internet Society, (2017)