Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparison of frameworks for high-performance packet IO, , , , and . Architectures for Networking and Communications Systems (ANCS), 2015 ACM/IEEE Symposium on, page 29-38. IEEE, (2015)Building Fast but Flexible Software Routers, , , , and . ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS 2017), Beijing, China, (May 2017)Revisiting Benchmarking Methodology for Interconnect Devices, , , , , and . The Applied Networking Research Workshop 2016 (ANRW '16), Berlin, Germany, (July 2016)A secure service infrastructure for interconnecting future home networks based on DPWS and XACML., , , and . HomeNets@SIGCOMM, page 31-36. ACM, (2010)Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008., , , , , and . Comput. Sci. Res. Dev., 23 (1): 15-25 (2009)Environment Modeling and Abstraction of Network States for Cognitive Functions., , , and . NOMS, page 1-8. IEEE, (2020)Data Querying and Access Control for Secure Multiparty Computation., , and . CoRR, (2019)The Amplification Threat Posed by PubliclyReachable BACnet Devices., , , , , and . J. Cyber Secur. Mobil., 6 (1): 77-104 (2017)5G URLLC: A Case Study on Low-Latency Intrusion Prevention., , , and . IEEE Commun. Mag., 58 (10): 35-41 (2020)EnGINE: Flexible Research Infrastructure for Reliable and Scalable Time Sensitive Networks., , , , , , , , , and 1 other author(s). J. Netw. Syst. Manag., 30 (4): 74 (2022)