Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Broad and load-aware anycast mapping with verfploeter., , , , , and . Internet Measurement Conference, page 477-488. ACM, (2017)Assessing the Quality of Flow Measurements from OpenFlow Devices., , , , and . TMA, IFIP, (2016)When the Dike Breaks: Dissecting DNS Defenses During DDoS., , , , and . Internet Measurement Conference, page 8-21. ACM, (2018)Recursives in the wild: engineering authoritative DNS servers., , , and . Internet Measurement Conference, page 489-495. ACM, (2017)Quantitative Comparison of the Efficiency and Scalability of the Current and Future LTE Network Architectures., , , and . Wirel. Commun. Mob. Comput., (2017)MANETs routing protocols evaluation in a scenario with high mobility MANET routing protocols performance and behavior., and . NOMS, page 883-886. IEEE, (2008)Evaluating automatic pools distribution techniques for self-configured networks., and . ISCC, page 658-663. IEEE Computer Society, (2011)Exploring security vulnerabilities of unmanned aerial vehicles., , and . NOMS, page 993-994. IEEE, (2016)ITSA: Internet traffic statistics archive., , and . NOMS, page 995-996. IEEE, (2016)Booter blacklist: Unveiling DDoS-for-hire websites., , , , , and . CNSM, page 144-152. IEEE, (2016)