Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coordinated sampling sans Origin-Destination identifiers: Algorithms and analysis., , , and . COMSNETS, page 1-10. IEEE, (2010)Less pain, most of the gain: incrementally deployable ICN., , , , , , , , and . SIGCOMM, page 147-158. ACM, (2013)Accurately Measuring Global Risk of Amplification Attacks using AmpMap., , , , , and . USENIX Security Symposium, page 3881-3898. USENIX Association, (2021)Jaqen: A High-Performance Switch-Native Approach for Detecting and Mitigating Volumetric DDoS Attacks with Programmable Switches., , , , , , , , and . USENIX Security Symposium, page 3829-3846. USENIX Association, (2021)SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks., , and . NDSS, The Internet Society, (2016)Understanding internet video viewing behavior in the wild., , , and . SIGMETRICS, page 379-380. ACM, (2013)Raising the Level of Abstraction for Time-State Analytics With the Timeline Framework., , , , , , and . CIDR, www.cidrdb.org, (2023)Lumen: a framework for developing and evaluating ML-based IoT network anomaly detection., , , , and . CoNEXT, page 59-71. ACM, (2022)Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions using FlowTags., , , , and . NSDI, page 543-546. USENIX Association, (2014)RareGAN: Generating Samples for Rare Classes., , , and . AAAI, page 7506-7515. AAAI Press, (2022)