Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

This Network is Infected : HosTaGe - a Low-Interaction Honeypot for Mobile Devices, , , , , , and . Security and Privacy in Smartphones & Mobile Devices, page 43--48. (2013)BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets, , , , and . IEEE International Conference on Communications (ICC),, (2016)Efficient Attack Correlation and Identification of Attack Scenarios based on Network-Motifs., , and . IPCCC, page 1-11. IEEE, (2019)Introduction to the Special Section on Recent Advances in Networks and Distributed Systems., , , and . ACM Trans. Internet Techn., 22 (4): 93:1-93:3 (November 2022)Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring., , , and . SEC, volume 648 of IFIP Advances in Information and Communication Technology, page 87-105. Springer, (2022)Towards Developing Resilient and Service-oriented Mission-critical Systems., , and . NetSoft, page 317-319. IEEE, (2023)Enhanced Performance and Privacy for TLS over TCP Fast Open., , , , and . CoRR, (2019)Enhanced performance for the encrypted web through TLS resumption across hostnames., , , , and . ARES, page 16:1-16:10. ACM, (2020)SDN/NFV-based DDoS Mitigation via Pushback., and . ICC, page 1-6. IEEE, (2020)Zeek-Osquery: Host-Network Correlation for Advanced Monitoring and Intrusion Detection., , and . SEC, volume 580 of IFIP Advances in Information and Communication Technology, page 248-262. Springer, (2020)