Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MAClets: active MAC protocols over hard-coded devices., , , , , and . CoNEXT, page 229-240. ACM, (2012)An Innovative Rate Adaptation Algorithm for Multicast Transmissions in Wireless LANs., , , and . VTC Spring, page 1-5. IEEE, (2013)Coarse Classification of Internet Traffic Aggregates., , , and . ICC, page 1-6. IEEE, (2010)On-line SVM traffic classification., , and . IWCMC, page 1778-1783. IEEE, (2011)Taking a Peek at Bandwidth Usage on Encrypted Links., , , and . ICC, page 1-6. IEEE, (2011)A dynamic and autonomous channel selection strategy for interference avoidance in 802.11., , and . WONS, page 1-8. IEEE, (2017)Non Intrusive Wi-Pi CSI Obfuscation Against Active Localization Attacks., , and . WONS, page 1-8. IEEE, (2021)Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets., , , and . USENIX Security Symposium, page 19-36. USENIX Association, (2020)Flow Management at Multi-Gbps: Tradeoffs and Lessons Learned., , , , , and . TMA, volume 8406 of Lecture Notes in Computer Science, page 1-14. Springer, (2014)An Experimental Evaluation of the Computational Cost of a DPI Traffic Classifier., , , , and . GLOBECOM, page 1-8. IEEE, (2009)