Author of the publication

Building a decentralized, cooperative, and privacy-preserving monitoring system for trustworthiness: the approach of the EU FP7 DEMONS project Very Large Projects.

, , , , and . IEEE Communications Magazine, 49 (11): 16-18 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building a decentralized, cooperative, and privacy-preserving monitoring system for trustworthiness: the approach of the EU FP7 DEMONS project Very Large Projects., , , , and . IEEE Communications Magazine, 49 (11): 16-18 (2011)Deployable filtering architectures against large denial-of-service attacks.. University College London, UK, (2010)British Library, EThOS.An edge-to-edge filtering architecture against DoS., and . Computer Communication Review, 37 (2): 39-50 (2007)Flow processing and the rise of commodity network hardware., , , , , and . Computer Communication Review, 39 (2): 20-26 (2009)BrainSlug: Transparent Acceleration of Deep Learning Through Depth-First Parallelism., , , and . CoRR, (2018)Lost in Network Address Translation: Lessons from Scaling the World's Simplest Middlebox., , and . HotMiddlebox@SIGCOMM, page 19-24. ACM, (2015)Enhancing the BRAS through virtualization., , , , , and . NetSoft, page 1-5. IEEE, (2015)Crosstalk: A Scalable Cross-Protocol Monitoring System for Anomaly Detection., , , , and . ICC, page 1-6. IEEE, (2010)Using Routing and Tunneling to Combat DoS Attacks., , and . SRUTI, USENIX Association, (2005)What's app?: a wide-scale measurement study of smart phone markets., , , , , and . Mobile Computing and Communications Review, 16 (2): 16-27 (2012)