Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning Regexes to Extract Network Names from Hostnames., , , and . AINTEC, page 9-17. ACM, (2021)Analysis of a "/0" stealth scan from a botnet., , , , and . Internet Measurement Conference, page 1-14. ACM, (2012)Challenges in Inferring Internet Interdomain Congestion., , , , and . Internet Measurement Conference, page 15-22. ACM, (2014)Network Hygiene, Incentives, and Regulation: Deployment of Source Address Validation in the Internet., , , , , and . CCS, page 465-480. ACM, (2019)Toward Topology Dualism: Improving the Accuracy of AS Annotations for Routers., , , and . PAM, volume 6032 of Lecture Notes in Computer Science, page 101-110. Springer, (2010)A Study of Burstiness in TCP Flows., , and . PAM, volume 3431 of Lecture Notes in Computer Science, page 13-26. Springer, (2005)The 3rd workshop on active internet measurements (AIMS-3) report.. Comput. Commun. Rev., 41 (3): 37-42 (2011)The Next Generation of BGP Data Collection Platforms., , , , and . SIGCOMM, page 794-812. ACM, (2024)Workshop on Internet Economics (WIE 2019) report., and . Comput. Commun. Rev., 50 (2): 53-59 (2020)Sublet Your Subnet: Inferring IP Leasing in the Wild., , , , and . IMC, page 328-336. ACM, (2024)