Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Geographically Informed Inter-Domain Routing., , , and . ICNP, page 103-112. IEEE Computer Society, (2007)Understanding Resiliency of Internet Topology against Prefix Hijack Attacks., , , and . DSN, page 368-377. IEEE Computer Society, (2007)Understanding the Challenges in Securing Internet Routing., , and . SAINT, page 145-148. IEEE Computer Society, (2009)Inferring the Origin of Routing Changes using Link Weights., , , and . ICNP, page 93-102. IEEE Computer Society, (2007)An Algorithmic Approach to Identifying Link Failures., , , and . PRDC, page 25-34. IEEE Computer Society, (2004)Visualizing Internet Routing Changes., , and . IEEE Trans. Vis. Comput. Graph., 12 (6): 1450-1460 (2006)Investigating Occurrence of Duplicate Updates in BGP Announcements., , , , , and . PAM, volume 6032 of Lecture Notes in Computer Science, page 11-20. Springer, (2010)Minimum failure explanations for path vector routing changes., , , , and . J. Comb. Optim., 12 (1-2): 5-16 (2006)PHAS: A Prefix Hijack Alert System., , , , , and . USENIX Security Symposium, USENIX Association, (2006)Link-Rank: a graphical tool for capturing BGP routing dynamics., , and . NOMS (1), page 627-640. IEEE, (2004)