Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Defeating the Crossfire Attack using SDN., , and . CoRR, (2014)traIXroute: Detecting IXPs in traceroute paths., and . CoRR, (2016)Graph Annotations in Modeling Complex Network Topologies, , , and . CoRR, (2007)Backpressure on the Backbone: A Lightweight, Non-Intrusive Traffic Engineering Approach., , and . IEEE Trans. Netw. Serv. Manag., 14 (1): 176-190 (2017)A BGP Attack Against Traffic Engineering., , , , and . WSC, page 318-326. IEEE Computer Society, (2004)Detecting Network Disruptions At Colocation Facilities., , and . INFOCOM, page 2161-2169. IEEE, (2019)ARTEMIS: Neutralizing BGP Hijacking within a Minute., , , , , , and . ANRW, page 6. ACM, (2018)Can SDN accelerate BGP convergence? - A performance analysis of inter-domain routing centralization., and . Networking, page 1-9. IEEE Computer Society, (2017)FaRNet: Fast recognition of high-dimensional patterns from big network traffic data., , and . Comput. Networks, 57 (18): 3897-3913 (2013)Detecting, validating and characterizing computer infections in the wild., and . Internet Measurement Conference, page 29-44. ACM, (2011)