Author of the publication

Distilling the Internet's Application Mix from Packet-Sampled Traffic.

, , , , and . PAM, volume 8995 of Lecture Notes in Computer Science, page 179-192. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Email worm detection by wavelet analysis of DNS query streams., , and . CICS, page 53-60. IEEE, (2009)On the importance of Internet eXchange Points for today's Internet ecosystem., , and . CoRR, (2013)Leveraging interconnections for performance: the serving infrastructure of a large CDN., , , , and . SIGCOMM, page 206-220. ACM, (2018)Distilling the Internet's Application Mix from Packet-Sampled Traffic., , , , and . PAM, volume 8995 of Lecture Notes in Computer Science, page 179-192. Springer, (2015)Mass MailingWorm Detection by Means of Situation Aware DNS.. ISADS, page 279-286. IEEE Computer Society, (2007)Quo vadis Open-IX?, , , and . Computer Communication Review, 45 (1): 12-18 (2015)Tigers vs Lions: Towards Characterizing Solitary and Group User Behavior in MMORPG, , , and . CoRR, (2013)Motivation for Behaviour-Based DNS Security: A Taxonomy of DNS-Related Internet Threats.. SECURWARE, page 36-41. IEEE Computer Society, (2007)Peering at Peerings: On the Role of IXP Route Servers., , , , , and . Internet Measurement Conference, page 31-44. ACM, (2014)Flow Level Data Mining of DNS Query Streams for Email Worm Detection., and . CISIS, volume 53 of Advances in Soft Computing, page 186-194. Springer, (2008)