Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From ideality to practicability in statistical packet features masking., and . IWCMC, page 456-462. IEEE, (2012)On the Resilience of Machine Learning-Based IDS for Automotive Networks., , , , , and . VNC, page 239-246. IEEE, (2023)Traffic matrix estimation enhanced by SDNs nodes in real network topology., , , , and . INFOCOM Workshops, page 300-305. IEEE, (2015)Towards Cyber Threat Intelligence for the IoT., , , and . CoRR, (2024)Padding and Fragmentation for Masking Packet Length Statistics., and . TMA, volume 7189 of Lecture Notes in Computer Science, page 85-88. Springer, (2012)Real Time Identification of SSH Encrypted Application Flows by Using Cluster Analysis Techniques., , , and . Networking, volume 5550 of Lecture Notes in Computer Science, page 182-194. Springer, (2009)On packet loss modeling: An empirical assessment., , and . NOF, page 33-39. IEEE, (2017)ARCADIAN-IoT - Enabling Autonomous Trust, Security and Privacy Management for IoT., , , , , , , , , and 1 other author(s). GIOTS, volume 13533 of Lecture Notes in Computer Science, page 348-359. Springer, (2022)What are you Googling? - Inferring search type information through a statistical classifier., , and . GLOBECOM, page 747-753. IEEE, (2013)Investigating the trade-off between overhead and delay for full packet traffic privacy., and . ICC Workshops, page 1345-1350. IEEE, (2013)