Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mixture models of endhost network traffic., , , , and . INFOCOM, page 225-229. IEEE, (2013)An In-Depth Measurement Analysis of 5G mmWave PHY Latency and Its Impact on End-to-End Delay., , , , , , , , , and 1 other author(s). PAM, volume 13882 of Lecture Notes in Computer Science, page 284-312. Springer, (2023)Exploiting Temporal Persistence to Detect Covert Botnet Channels., , , , and . RAID, volume 5758 of Lecture Notes in Computer Science, page 326-345. Springer, (2009)Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates., , and . INFOCOM, IEEE, (2006)A first step toward understanding inter-domain routing dynamics., , and . MineNet, page 207-212. ACM, (2005)Characterizing mobile user habits: The case for energy budgeting., , , , , , and . INFOCOM Workshops, page 306-311. IEEE, (2015)Collaborative defense as a pervasive service Architectural insights and validation methodologies of a trial deployment., , , , , , , , , and . TRIDENTCOM, page 1-6. IEEE Computer Society, (2009)Building a Power-Proportional Software Router., , , , and . USENIX ATC, page 89-100. USENIX Association, (2012)Service Oriented Internet., , , and . ICSOC, volume 2910 of Lecture Notes in Computer Science, page 543-558. Springer, (2003)Limiting path exploration in BGP., , , and . INFOCOM, page 2337-2348. IEEE, (2005)