Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementation and Deployment of a Distributed Network Topology Discovery Algorithm, , , and . CoRR, (2006)The DNS in IoT: Opportunities, Risks, and Challenges., , , , , , , , , and 1 other author(s). IEEE Internet Comput., 24 (4): 23-32 (2020)Beyond folklore: observations on fragmented traffic., , and . IEEE/ACM Trans. Netw., 10 (6): 709-720 (2002)Spectroscopy of DNS update traffic., , and . SIGMETRICS, page 320-321. ACM, (2003)Learning to extract geographic information from internet router hostnames., , , , , and . CoNEXT, page 440-453. ACM, (2021)Internet Measurement: Myths About Internet Data.. LISA, USENIX, (2001)Follow the scent: defeating IPv6 prefix rotation privacy., , and . Internet Measurement Conference, page 739-752. ACM, (2021)Characteristics of fragmented IP traffic on internet links., , and . Internet Measurement Workshop, page 83-97. ACM, (2001)A Scalable Architecture for Monitoring and Visualizing Multicast Statistics., , and . DSOM, volume 1960 of Lecture Notes in Computer Science, page 1-12. Springer, (2000)Code-Red: a case study on the spread and victims of an internet worm., , and . Internet Measurement Workshop, page 273-284. ACM, (2002)