Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NetCluster: A Clustering-Based Framework for Internet Tomography., , , , and . ICC, page 1-5. IEEE, (2009)Empirical assessment of VoIP overload detection tests., , and . NGI, page 1-8. IEEE, (2010)EXPLAIN-IT: Towards Explainable AI for Unsupervised Network Traffic Analysis., , and . CoRR, (2020)A Survey on Big Data for Network Traffic Monitoring and Analysis., , , , and . CoRR, (2020)Dissecting a data-driven prognostic pipeline: A powertrain use case., , , , , , , and . Expert Syst. Appl., (2021)Statistical network monitoring: Methodology and application to carrier-grade NAT., , , , , , and . Comput. Networks, (2016)Nazca: Detecting Malware Distribution in Large-Scale Networks., , , , , , , and . NDSS, The Internet Society, (2014)z-anonymity: Zero-Delay Anonymization for Data Streams., , , , and . IEEE BigData, page 3996-4005. IEEE, (2020)Minimizing ISP Network Energy Cost: Formulation and Solutions., , and . IEEE/ACM Trans. Netw., 20 (2): 463-476 (2012)Users' Fingerprinting Techniques from TCP Traffic., , , , and . Big-DAMA@SIGCOMM, page 49-54. ACM, (2017)