Author of the publication

Exploiting the IPID Field to Infer Network Path and End-System Characteristics.

, , , , , , , and . PAM, volume 3431 of Lecture Notes in Computer Science, page 108-120. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimized transmission power control of interrogators for collision arbitration in UHF RFID systems., , , , and . IEEE Commun. Lett., 11 (1): 22-24 (2007)Characterizing and Detecting Skype-Relayed Traffic., , , and . INFOCOM, IEEE, (2006)Passive online wireless LAN health monitoring from a single measurement point., , , and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 14 (4): 19-21 (2010)Identifying 802.11 Traffic From Passive Measurements Using Iterative Bayesian Inference., , , , , and . IEEE/ACM Trans. Netw., 20 (2): 325-338 (2012)Network performance of smart mobile handhelds in a university campus WiFi network., , , , and . Internet Measurement Conference, page 315-328. ACM, (2012)P2Cast: peer-to-peer patching for video on demand service., , , and . Multim. Tools Appl., 33 (2): 109-129 (2007)Analysis of Permission Selection Techniques in Machine Learning-based Malicious App Detection., , , , and . AIKE, page 92-99. IEEE, (2020)Detecting Malicious Android Apps using the Popularity and Relations of APIs., , , , , and . AIKE, page 309-312. IEEE, (2019)Locating network monitors: complexity, heuristics, and coverage., , , and . INFOCOM, page 351-361. IEEE, (2005)Enhanced Android Malware Detection: An SVM-Based Machine Learning Approach., , , , , and . BigComp, page 75-81. IEEE, (2020)