Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How to Catch when Proxies Lie: Verifying the Physical Locations of Network Proxies with Active Geolocation., , , , and . Internet Measurement Conference, page 203-217. ACM, (2018)Biases in Data-Driven Networking, and What to Do About Them., , , , and . HotNets, page 192-198. ACM, (2017)CARE: Content Aware Redundancy Elimination for Disaster Communications on Damaged Networks, , , , , and . CoRR, (2012)Enabling Software-Defined Network Security for Next-Generation Networks.. CoNEXT, page 1. ACM, (2016)Stratos: A Network-Aware Orchestration Layer for Middleboxes in the Cloud, , , , , , , , and . CoRR, (2013)Sketchy With a Chance of Adoption: Can Sketch-Based Telemetry Be Ready for Prime Time?, , , , , , and . NetSoft, page 9-16. IEEE, (2021)Practical GAN-based synthetic IP header trace generation using NetShare., , , , and . SIGCOMM, page 458-472. ACM, (2022)Bohatei: Flexible and Elastic DDoS Defense., , , and . USENIX Security Symposium, page 817-832. USENIX Association, (2015)Efficient and Correct Test Scheduling for Ensembles of Network Policies., , , and . NSDI, page 437-452. USENIX Association, (2018)Don't Yank My Chain: Auditable NF Service Chaining., , , , , and . NSDI, page 155-173. USENIX Association, (2021)