Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards improving packet probing techniques., , and . Internet Measurement Workshop, page 145-150. ACM, (2001)A Second Look at Detecting Third-Party Addresses in Traceroute Traces with the IP Timestamp Option., and . PAM, volume 8362 of Lecture Notes in Computer Science, page 46-55. Springer, (2014)Pushing the Boundaries with bdrmapIT: Mapping Router Ownership at Internet Scale., , , , , and . Internet Measurement Conference, page 56-69. ACM, (2018)MERLIN: MEasure the router level of the INternet., , , , and . NGI, page 1-8. IEEE, (2011)Challenges in inferring spoofed traffic at IXPs., , , , and . CoNEXT, page 96-109. ACM, (2019)Challenges in Inferring Internet Interdomain Congestion., , , , and . Internet Measurement Conference, page 15-22. ACM, (2014)Network Hygiene, Incentives, and Regulation: Deployment of Source Address Validation in the Internet., , , , , and . CCS, page 465-480. ACM, (2019)Don't Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy., , , and . NDSS, The Internet Society, (2016)Scamper: a scalable and extensible packet prober for active measurement of the internet.. Internet Measurement Conference, page 239-245. ACM, (2010)bdrmap: Inference of Borders Between IP Networks., , , , and . Internet Measurement Conference, page 381-396. ACM, (2016)