Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intent-driven composition of resource-management SDN applications., , , and . CoNEXT, page 86-97. ACM, (2018)Evolution of social-attribute networks: measurements, modeling, and implications using google+., , , , , , and . Internet Measurement Conference, page 131-144. ACM, (2012)Shedding light on the structure of internet video quality problems in the wild., , , and . CoNEXT, page 357-368. ACM, (2013)One Sketch to Rule Them All: Rethinking Network Flow Monitoring with UnivMon., , , , and . SIGCOMM, page 101-114. ACM, (2016)CS2P: Improving Video Bitrate Selection and Adaptation with Data-Driven Throughput Prediction., , , , , , , and . SIGCOMM, page 272-285. ACM, (2016)A First Look at Performance in Mobile Virtual Network Operators., , , , and . Internet Measurement Conference, page 165-172. ACM, (2014)SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks., , and . NDSS, The Internet Society, (2016)Understanding internet video viewing behavior in the wild., , , and . SIGMETRICS, page 379-380. ACM, (2013)Accurately Measuring Global Risk of Amplification Attacks using AmpMap., , , , , and . USENIX Security Symposium, page 3881-3898. USENIX Association, (2021)Jaqen: A High-Performance Switch-Native Approach for Detecting and Mitigating Volumetric DDoS Attacks with Programmable Switches., , , , , , , , and . USENIX Security Symposium, page 3829-3846. USENIX Association, (2021)