Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysing Costs and Benefits of Content Sharing in Cloud Storage., , , , and . LANCOMM@SIGCOMM, page 43-45. ACM, (2016)A Survey on Big Data for Network Traffic Monitoring and Analysis., , , , and . CoRR, (2020)Measuring the Performance of iCloud Private Relay., , , and . PAM, volume 13882 of Lecture Notes in Computer Science, page 3-17. Springer, (2023)RL-IoT: Reinforcement Learning to Interact with IoT Devices., , , and . COINS, page 1-6. IEEE, (2021)Cross-Network Embeddings Transfer for Traffic Analysis., , , , , , and . IEEE Trans. Netw. Serv. Manag., 21 (3): 2686-2699 (June 2024)α-MON: Anonymized Passive Traffic Monitoring., , , and . ITC, page 10-18. IEEE, (2020)Sound-skwatter (Did You Mean: Sound-squatter?) AI-powered Generator for Phishing Prevention., , , and . CoRR, (2023)Challenges for Driver Action Recognition with Face Masks., , , , and . ITSC, page 1491-1497. IEEE, (2022)Are Darknets All The Same? On Darknet Visibility for Security Monitoring., , , , , and . LANMAN, page 1-6. IEEE, (2019)What Scanners do at L7? Exploring Horizontal Honeypots for Security Monitoring., , , and . EuroS&P Workshops, page 307-313. IEEE, (2022)