Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Polymorphic Encryption and Pseudonymisation of IP Network Flows., and . CoRR, (2019)Polymorphic Encryption and Pseudonymisation of IP Network Flows., and . Networking, page 494-498. IEEE, (2020)Evaluating RPKI ROV identification methodologies in automatically generated mininet topologies., , , , , and . CoNEXT, page 530-531. ACM, (2020)Threats and surprises behind IPv6 extension headers., , , , and . TMA, page 1-9. IEEE, (2017)A National Programmable Infrastructure to Experiment with Next-Generation Networks., , , , , , , , and . IM, page 778-782. IEEE, (2021)On the Potential of IPv6 Open Resolvers for DDoS Attacks., , , and . PAM, volume 10176 of Lecture Notes in Computer Science, page 17-29. Springer, (2017)Flow-Based Detection of IPv6-specific Network Layer Attacks., , , , and . AIMS, volume 10356 of Lecture Notes in Computer Science, page 137-142. Springer, (2017)IPv6-specific misconfigurations in the DNS., , and . CNSM, page 1-5. IEEE Computer Society, (2017)Assessing the Quality of Flow Measurements from OpenFlow Devices., , , , and . TMA, IFIP, (2016)