Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trapping botnets by DNS failure graphs: Validation, extension and application to a 3G network., , and . INFOCOM, page 3159-3164. IEEE, (2013)On the analysis of QoE-based performance degradation in YouTube traffic., , , , and . CNSM, page 1-9. IEEE Computer Society, (2014)On the detection of network traffic anomalies in content delivery network services., , , , and . International Teletraffic Congress, page 1-9. IEEE, (2014)MTRAC - discovering M2M devices in cellular networks from coarse-grained measurements., , and . ICC, page 667-672. IEEE, (2015)DBStream: A holistic approach to large-scale network traffic monitoring and analysis., , , , , , and . Computer Networks, (2016)Grasping Popular Applications in Cellular Networks With Big Data Analytics Platforms., , , , and . IEEE Trans. Network and Service Management, 13 (3): 681-695 (2016)Large-scale network traffic monitoring with DBStream, a system for rolling big data analysis., , , , and . BigData, page 165-170. IEEE Computer Society, (2014)Who to blame when YouTube is not working? detecting anomalies in CDN-provisioned services., , , , and . IWCMC, page 435-440. IEEE, (2014)A Lightweight Mobile TV Recommender., , , and . EuroITV, volume 5066 of Lecture Notes in Computer Science, page 143-147. Springer, (2008)IP mining: Extracting knowledge from the dynamics of the Internet addressing space., , and . International Teletraffic Congress, page 1-9. IEEE, (2013)