Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A coherent moral relativism., , and . Synthese, 166 (2): 413-430 (2009)Applying Cybersecurity Challenges to Medical and Vehicular Cyber Physical Systems.. SafeConfig@CCS, page 39. ACM, (2017)Incremental Deployment Strategies for Effective Detection and Prevention of BGP Origin Hijacks., , and . ICDCS, page 670-679. IEEE Computer Society, (2014)Efficient Algorithms For Optimizing Policy-Constrained Routing., , and . IWQoS, page 113-116. IEEE, (2007)Zone state revocation for DNSSEC., , , and . LSAD@SIGCOMM, page 153-160. ACM, (2007)G-RCA: a generic root cause analysis platform for service quality management in large IP networks., , , , , and . CoNEXT, page 5. ACM, (2010)Epiphany: A location hiding architecture for protecting critical services from DDoS attacks., , and . DSN, page 1-12. IEEE Computer Society, (2012)DroneScale: drone load estimation via remote passive RF sensing., , , , , , , , , and 2 other author(s). SenSys, page 326-339. ACM, (2020)Dynamics of Prefix Usage at an Edge Router., , and . PAM, volume 6579 of Lecture Notes in Computer Science, page 11-20. Springer, (2011)Analyzing the Aftermath of the McColo Shutdown., , , and . SAINT, page 157-160. IEEE Computer Society, (2009)