Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Zone state revocation for DNSSEC., , , and . LSAD@SIGCOMM, page 153-160. ACM, (2007)Efficient Algorithms For Optimizing Policy-Constrained Routing., , and . IWQoS, page 113-116. IEEE, (2007)Applying Cybersecurity Challenges to Medical and Vehicular Cyber Physical Systems.. SafeConfig@CCS, page 39. ACM, (2017)A coherent moral relativism., , and . Synthese, 166 (2): 413-430 (2009)Epiphany: A location hiding architecture for protecting critical services from DDoS attacks., , and . DSN, page 1-12. IEEE Computer Society, (2012)Incremental Deployment Strategies for Effective Detection and Prevention of BGP Origin Hijacks., , and . ICDCS, page 670-679. IEEE Computer Society, (2014)G-RCA: a generic root cause analysis platform for service quality management in large IP networks., , , , , and . CoNEXT, page 5. ACM, (2010)DroneScale: drone load estimation via remote passive RF sensing., , , , , , , , , and 2 other author(s). SenSys, page 326-339. ACM, (2020)Dynamics of Prefix Usage at an Edge Router., , and . PAM, volume 6579 of Lecture Notes in Computer Science, page 11-20. Springer, (2011)A taxonomy of capabilities based DDoS defense architectures., , and . AICCSA, page 157-164. IEEE Computer Society, (2011)