Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Creating Realistic BGP Models., and . MASCOTS, page 64-70. IEEE Computer Society, (2003)Large-Scale Simulation Models of BGP., and . MASCOTS, page 287-294. IEEE Computer Society, (2004)Understanding Network Forensics Analysis in an Operational Environment., and . IEEE Symposium on Security and Privacy Workshops, page 111-118. IEEE Computer Society, (2013)SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics., , , and . USENIX Security Symposium, page 223-240. USENIX Association, (2010)Fast Privacy-Preserving Top-k Queries Using Secret Sharing., and . ICCCN, page 1-7. IEEE, (2010)Shedding Light on Log Correlation in Network Forensics Analysis., , and . DIMVA, volume 7591 of Lecture Notes in Computer Science, page 232-241. Springer, (2012)Lost in Space: Improving Inference of IPv4 Address Space Utilization., , , , , , , , and . CoRR, (2014)ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking., , , and . SIGCOMM, page 625-626. ACM, (2016)A Novel Framework for Modeling and Mitigating Distributed Link Flooding Attacks., , and . CoRR, (2016)Enabling Ultra-Low Delay Teleorchestras using Software Defined Networking., , and . CoRR, (2018)