Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nazca: Detecting Malware Distribution in Large-Scale Networks., , , , , , , and . NDSS, The Internet Society, (2014)TFA: a large scale urban mesh network for social and network research., , , and . S3@MobiCom, page 49-52. ACM, (2010)Routing Primitives for Wireless Mesh Networks: Design, Analysis and Experiments., and . INFOCOM, page 2793-2801. IEEE, (2010)Automatic generation of mobile app signatures from traffic observations., , , , , , and . INFOCOM, page 1481-1489. IEEE, (2015)Network Connectivity Graph for Malicious Traffic Dissection., , , , , , , and . ICCCN, page 1-9. IEEE, (2015)The Online Tracking Horde: A View from Passive Measurements., , , , and . TMA, volume 9053 of Lecture Notes in Computer Science, page 111-125. Springer, (2015)CrowdSurf: Empowering Transparency in the Web., , , , and . Comput. Commun. Rev., 45 (5): 5-12 (2015)FLOWR: a self-learning system for classifying mobileapplication traffic., , , , , , and . SIGMETRICS, page 569-570. ACM, (2014)GeoEcho: Inferring User Interests from Geotag Reports in Network Traffic., , , , and . WI-IAT (1), page 1-8. IEEE Computer Society, (2014)AppPrint: Automatic Fingerprinting of Mobile Applications in Network Traffic., , , and . PAM, volume 8995 of Lecture Notes in Computer Science, page 57-69. Springer, (2015)