Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NAT-MANEMO: Route Optimization for Unlimited Network Extensibility in MANEMO., , , , and . J. Inf. Process., (2011)Floating ground architecture: overcoming the one-hop boundary of current mobile internet., , , , , and . ANCS, page 187-198. ACM, (2012)DNEmu: Design and Implementation of Distributed Network Emulation for Smooth Experimentation Control., and . TRIDENTCOM, volume 44 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 162-177. Springer, (2012)DCE cradle: simulate network protocols with real stacks for better realism., , and . SimuTools, page 153-158. ICST/ACM, (2013)MATATABI: Multi-layer Threat Analysis Platform with Hadoop., , , and . BADGERS@ESORICS, page 75-82. IEEE, (2014)Exit-Less, Isolated, and Shared Access for Virtual Machines., , and . ASPLOS (3), page 224-237. ACM, (2023)Grafting sockets for fast container networking., , and . ANCS, page 15-27. ACM, (2018)EyeBit: Eye-Tracking Approach for Enforcing Phishing Prevention Habits., , , , and . BADGERS@ESORICS, page 56-65. IEEE, (2014)Network mobility management in HIMALIS architecture of future networks., , , and . GLOBECOM Workshops, page 998-1003. IEEE, (2012)zpoline: a system call hook mechanism based on binary rewriting., , , and . USENIX Annual Technical Conference, page 293-300. USENIX Association, (2023)