Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Revealing MPLS tunnels obscured from traceroute, , , and . ACM SIGCOMM Computer Communication Review, 42 (2): 87–93 (March 2012)Spoofed traffic inference at IXPs: Challenges, methods and analysis., , , , and . Comput. Networks, (2020)Access Denied: Assessing Physical Risks to Internet Access Networks., , , , , , , , , and . USENIX Security Symposium, page 6877-6892. USENIX Association, (2023)Helix: Traffic Engineering for Multi-Controller SDN., , , and . SOSR, page 80-87. ACM, (2021)Identifying Equivalent SDN Forwarding Behaviour., , and . SOSR, page 127-139. ACM, (2019)Learning to extract geographic information from internet router hostnames., , , , , and . CoNEXT, page 440-453. ACM, (2021)On the Latency Impact of Remote Peering., , , , and . PAM, volume 13210 of Lecture Notes in Computer Science, page 367-392. Springer, (2022)Deployment of Source Address Validation by Network Operators: A Randomized Control Trial., , , , , and . SP, page 2361-2378. IEEE, (2022)Learning Regexes to Extract Network Names from Hostnames., , , and . AINTEC, page 9-17. ACM, (2021)vrfinder: Finding Outbound Addresses in Traceroute., , , and . Proc. ACM Meas. Anal. Comput. Syst., 4 (2): 40:1-40:28 (2020)