Author of the publication

Measuring BGP Pass-Through Times.

, , , and . PAM, volume 3015 of Lecture Notes in Computer Science, page 267-277. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Creating and Detecting IPv6 Transition Mechanism-Based Information Exfiltration Covert Channels., , , , and . NordSec, volume 10014 of Lecture Notes in Computer Science, page 85-100. (2016)Understanding the Reachability of IPv6 Limited Visibility Prefixes., , , and . PAM, volume 8362 of Lecture Notes in Computer Science, page 163-172. Springer, (2014)Internet optometry: assessing the broken glasses in internet reachability., , , and . Internet Measurement Conference, page 242-253. ACM, (2009)i-tee: A fully automated Cyber Defense Competition for Students., , and . SIGCOMM, page 113-114. ACM, (2015)Modeling BGP Table Fluctuations., , , and . International Teletraffic Congress, volume 4516 of Lecture Notes in Computer Science, page 141-153. Springer, (2007)Security and privacy issues in cloud computing., , and . Annales des Télécommunications, 72 (5-6): 233-235 (2017)Towards detecting BGP route hijacking using the RPKI., , and . SIGCOMM, page 103-104. ACM, (2012)RiPKI: The Tragic Story of RPKI Deployment in the Web Ecosystem., , , , , and . HotNets, page 11:1-11:7. ACM, (2015)Workshop on network-I/O convergence: experience, lessons, implications (NICELI)., , , and . Computer Communication Review, 33 (5): 75-80 (2003)A comprehensive instrument for identifying critical information infrastructure services., and . IJCIP, (2019)