Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring large scale security system reproducibility with the LESS simulator., and . Journal of Computer Security, 24 (5): 645-665 (2016)TMC: Pay-as-you-Go Distributed Communication., , , , , , , , and . APNet, page 15-21. ACM, (2019)Turboflow: information rich flow record generation on commodity switches., , , and . EuroSys, page 11:1-11:16. ACM, (2018)Packet-Level Analytics in Software without Compromises., , , and . HotCloud, USENIX Association, (2018)Scaling Hardware Accelerated Network Monitoring to Concurrent and Dynamic Queries With *Flow., , , , and . USENIX Annual Technical Conference, page 823-835. USENIX Association, (2018)Timing SDN Control Planes to Infer Network Configurations., , and . SDN-NFV@CODASPY, page 19-22. ACM, (2016)Ignis: scaling distribution-oblivious systems with light-touch distribution., , , , , and . PLDI, page 1010-1026. ACM, (2019)Enabling Practical Software-defined Networking Security Applications with OFX., , , and . NDSS, The Internet Society, (2016)POSTER: OFX: Enabling OpenFlow Extensions for Switch-Level Security Applications., , , and . ACM Conference on Computer and Communications Security, page 1678-1680. ACM, (2015)Cross-domain collaboration for improved IDS rule set selection., , and . J. Inf. Secur. Appl., (2015)