Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mapping and Visualizing the Internet., , and . USENIX Annual Technical Conference, General Track, page 1-12. USENIX, (2000)Mapping the Internet., and . Computer, 32 (4): 97-98 (1999)Tracing Anonymous Packets to Their Approximate Source., and . LISA, page 319-327. USENIX, (2000)Mapping Corporate Intranets and Internets.. LISA, USENIX, (2000)Visual tools for security: Is there a there there?. VizSEC, IEEE Computer Society, (2009)My Dad's Computer, Microsoft, and the Future of Internet Security.. USENIX Security Symposium, USENIX, (2004)The Design of a Secure Internet Gateway.. USENIX Summer, page 233-238. USENIX Association, (1990)Jails, VMs, and Sandboxes.. LISA, USENIX, (2007)Worm Propagation Strategies in an IPv6 Internet., , and . login Usenix Mag., (2006)What Can You Do with Traceroute?, , , and . IEEE Internet Comput., 5 (5): 96 (2001)