Author of the publication

Identifying hidden voice and video streams.

, , , , and . Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security, volume 7344 of SPIE Proceedings, page 73440F. SPIE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

You can SPIT, but you can't hide: Spammer identification in telephony networks., , , , and . INFOCOM, page 41-45. IEEE, (2011)Challenges in Network Application Identification., , and . LEET, USENIX Association, (2012)Can ISPs and Overlay Networks Form a Synergistic Co-existence?, , , and . DSOM, volume 3278 of Lecture Notes in Computer Science, page 263-265. Springer, (2004)Self-learning classifier for Internet traffic., , , and . INFOCOM, page 3381-3386. IEEE, (2013)SANTaClass: A Self Adaptive Network Traffic Classification system., , and . Networking, page 1-9. IEEE Computer Society, (2013)Un-zipping cellular infrastructure locations via user geo-intent., , , , and . INFOCOM, page 121-125. IEEE, (2011)Avoiding Transient Loops Through Interface-Specific Forwarding., , , , , , and . IWQoS, volume 3552 of Lecture Notes in Computer Science, page 219-232. Springer, (2005)Towards self adaptive network traffic classification., , , , and . Comput. Commun., (2015)DNS to the rescue: discerning content and services in a tangled web., , , , and . Internet Measurement Conference, page 413-426. ACM, (2012)Overlay Networks: Applications, Coexistence with IP Layer, and Transient Dynamics., and . Algorithms for Next Generation Networks, Springer, (2010)