Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BGP beacons., , , and . Internet Measurement Conference, page 1-14. ACM, (2003)iSPY: Detecting IP Prefix Hijacking on My Own., , , , and . IEEE/ACM Trans. Netw., 18 (6): 1815-1828 (2010)RPKI Time-of-Flight: Tracking Delays in the Management, Control, and Data Planes., , , , and . PAM, volume 13882 of Lecture Notes in Computer Science, page 429-457. Springer, (2023)Testing the reachability of (new) address space., , , , and . INM@SIGCOMM, page 236-241. ACM, (2007)Rasch Analysis of HTTPS Reachability., , , , and . Networking, page 1-9. IFIP, (2018)Avoiding Route Origin Authorizations (ROAs) Containing Multiple IP Prefixes., , , , and . RFC, (August 2023)What do parrots and BGP routers have in common?, , , and . Comput. Commun. Rev., 46 (3): 2:1-2:6 (2016)Comparing Machine Learning Algorithms for BGP Anomaly Detection using Graph Features., , , and . Big-DAMA@CoNEXT, page 35-41. ACM, (2019)HAIR: hierarchical architecture for internet routing., , , , and . ReArch@CoNEXT, page 43-48. ACM, (2009)The Japan earthquake: the impact on traffic and routing observed by a local ISP., , , and . SWID@CoNEXT, page 2:1-2:8. ACM, (2011)