Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Open collaborative hyperpapers: a call to action., , , , , and . Comput. Commun. Rev., 49 (1): 31-33 (2019)Towards Improving Outage Detection with Multiple Probing Protocols., , and . PAM (1), volume 14537 of Lecture Notes in Computer Science, page 189-205. Springer, (2024)Analysis of a "/0" stealth scan from a botnet., , , , and . Internet Measurement Conference, page 1-14. ACM, (2012)Leveraging Internet Background Radiation for Opportunistic Network Analysis., , , , and . Internet Measurement Conference, page 423-436. ACM, (2015)How to Find Correlated Internet Failures., , , , and . PAM, volume 11419 of Lecture Notes in Computer Science, page 210-227. Springer, (2019)ARTEMIS: Neutralizing BGP Hijacking within a Minute., , , , , , and . ANRW, page 6. ACM, (2018)Destination Unreachable: Characterizing Internet Outages and Shutdowns., , , , , , , , and . SIGCOMM, page 608-621. ACM, (2023)How to Operate a Meta-Telescope in your Spare Time., , , , , , and . IMC, page 328-343. ACM, (2023)iGDB: connecting the physical and logical layers of the internet., , , , and . IMC, page 433-448. ACM, (2022)Analysis of IPv4 address space utilization with ANT ISI dataset and censys., , and . IMC, page 744-745. ACM, (2022)