Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool's Monitoring System., , , and . USENIX Security Symposium, page 6151-6166. USENIX Association, (2023)SVLAN: Secure & Scalable Network Virtualization., , , and . NDSS, The Internet Society, (2020)PsyBoG: Power spectral density analysis for detecting botnet groups., , , , and . MALWARE, page 85-92. IEEE Computer Society, (2014)CLORIFI: software vulnerability discovery using code clone verification., , , and . Concurr. Comput. Pract. Exp., 28 (6): 1900-1917 (2016)An incrementally deployable anti-spoofing mechanism for software-defined networks., , , , , and . Comput. Commun., (2015)Mondrian: Comprehensive Inter-domain Network Zoning Architecture., , , and . NDSS, The Internet Society, (2021)Analysis of NTP pool monitoring system based on multiple monitoring stations., , and . MobiHoc, page 259-264. ACM, (2022)Carbon-Aware Global Routing in Path-Aware Networks., , , and . e-Energy, page 144-158. ACM, (2023)SpeedCam: Towards Efficient Flow Monitoring for Multipath Communication., , and . IM, page 860-865. IEEE, (2021)DroidGraph: discovering Android malware by analyzing semantic behavior., , , and . CNS, page 498-499. IEEE, (2014)