Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sensing the Noise: Uncovering Communities in Darknet Traffic., , , , and . MedComNet, page 1-8. IEEE, (2020)DPI Solutions in Practice: Benchmark and Comparison., , , , and . SP (Workshops), page 37-42. IEEE, (2021)Network security and anomaly detection with Big-DAMA, a big data analytics framework., , , , and . CloudNet, page 16-22. IEEE, (2017)Achieving Horizontal Scalability in Density-based Clustering for URLs., , , , , and . IEEE BigData, page 3841-3846. IEEE, (2018)Are Darknets All The Same? On Darknet Visibility for Security Monitoring., , , , , and . LANMAN, page 1-6. IEEE, (2019)Campus traffic and e-Learning during COVID-19 pandemic., , , , and . Comput. Networks, (2020)Does domain name encryption increase users' privacy?, , , , and . Comput. Commun. Rev., 50 (3): 16-22 (2020)Attacking DoH and ECH: Does Server Name Encryption Protect Users' Privacy?, , , , and . ACM Trans. Internet Techn., 23 (1): 19:1-19:22 (2023)Cybersecurity Analysis in the UAV Domain: the Practical Approach of the Labyrinth Project., , , and . GoodIT, page 446-454. ACM, (2023)Enlightening the Darknets: Augmenting Darknet Visibility With Active Probes., , , , , , , and . IEEE Trans. Netw. Serv. Manag., 20 (4): 5012-5025 (December 2023)