Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

iSPY: Detecting IP Prefix Hijacking on My Own., , , , and . IEEE/ACM Trans. Netw., 18 (6): 1815-1828 (2010)BGP beacons., , , and . Internet Measurement Conference, page 1-14. ACM, (2003)RPKI Time-of-Flight: Tracking Delays in the Management, Control, and Data Planes., , , , and . PAM, volume 13882 of Lecture Notes in Computer Science, page 429-457. Springer, (2023)Testing the reachability of (new) address space., , , , and . INM@SIGCOMM, page 236-241. ACM, (2007)Rasch Analysis of HTTPS Reachability., , , , and . Networking, page 1-9. IFIP, (2018)HAIR: hierarchical architecture for internet routing., , , , and . ReArch@CoNEXT, page 43-48. ACM, (2009)Revisiting Recommended BGP Route Flap Damping Configurations., , , , and . TMA, IFIP, (2021)The Japan earthquake: the impact on traffic and routing observed by a local ISP., , , and . SWID@CoNEXT, page 2:1-2:8. ACM, (2011)On Measuring RPKI Relying Parties., , , , , , and . Internet Measurement Conference, page 484-491. ACM, (2020)Comparing Machine Learning Algorithms for BGP Anomaly Detection using Graph Features., , , and . Big-DAMA@CoNEXT, page 35-41. ACM, (2019)