Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamics of Prefix Usage at an Edge Router., , and . PAM, volume 6579 of Lecture Notes in Computer Science, page 11-20. Springer, (2011)Identifying BGP routing table transfers., , , and . Comput. Networks, 55 (3): 636-649 (2011)Fault Detection in Routing Protocols., and . ICNP, page 31-42. IEEE Computer Society, (1999)Behavior of DNS' Top Talkers, a .com/.net View., , , , and . PAM, volume 7192 of Lecture Notes in Computer Science, page 211-220. Springer, (2012)Analyzing the Aftermath of the McColo Shutdown., , , and . SAINT, page 157-160. IEEE Computer Society, (2009)A taxonomy of capabilities based DDoS defense architectures., , and . AICCSA, page 157-164. IEEE Computer Society, (2011)Detecting encrypted botnet traffic., , and . INFOCOM, page 3453-3458. IEEE, (2013)Reliably, Securely and Efficiently Distributing Electronic Content Using Multicasting., , , and . EC-Web, volume 3590 of Lecture Notes in Computer Science, page 327-336. Springer, (2005)A flexible multicast routing protocol for group communication., , , and . Comput. Networks, 32 (1): 35-60 (2000)Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback., , and . IFIP Int. Conf. Digital Forensics, volume 194 of IFIP, page 165-176. Springer, (2005)