Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nazca: Detecting Malware Distribution in Large-Scale Networks., , , , , , , and . NDSS, The Internet Society, (2014)On the feasibility of exploiting P2P systems to launch DDoS attacks., , and . Peer-to-Peer Netw. Appl., 3 (1): 36-51 (2010)Enabling Confidentiality of Data Delivery in an Overlay Broadcasting System., , , , and . INFOCOM, page 607-615. IEEE, (2007)Leveraging client-side DNS failure patterns to identify malicious behaviors., , , , , , and . CNS, page 406-414. IEEE, (2015)Approximate matching of persistent LExicon using search-engines for classifying Mobile app traffic., , and . INFOCOM, page 1-9. IEEE, (2016)Detecting malicious clients in ISP networks using HTTP connectivity graph and flow information., , , , , , and . ASONAM, page 150-157. IEEE Computer Society, (2014)YouTube everywhere: impact of device and infrastructure synergies on user experience., , , , and . Internet Measurement Conference, page 345-360. ACM, (2011)Characterization of community based-P2P systems and implications for traffic localization., , , and . Peer-to-Peer Netw. Appl., 6 (2): 118-133 (2013)MAPPER: A Mobile Application Personal Policy Enforcement Router for Enterprise Networks., , , , , , , and . EWSDN, page 131-132. IEEE Computer Society, (2014)Per-user policy enforcement on mobile apps through network functions virtualization., , , , , , , and . MobiArch, page 37-42. ACM, (2014)