Author of the publication

Quantifying the accuracy of the ground truth associated with Internet traffic traces.

, , and . Comput. Networks, 55 (5): 1158-1167 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Preliminary Look at the Privacy of SSH Tunnels., , and . ICCCN, page 626-632. IEEE, (2008)Detection of Encrypted Tunnels Across Network Boundaries., , , and . ICC, page 1738-1744. IEEE, (2008)Pattern Recognition Approaches for Classifying IP Flows., , , , and . SSPR/SPR, volume 5342 of Lecture Notes in Computer Science, page 885-895. Springer, (2008)A statistical approach to IP-level classification of network traffic., , , and . ICC, page 170-176. IEEE, (2006)HAWAII: a domain-based approach for supporting mobility in wide-area wireless networks., , , , , and . IEEE/ACM Trans. Netw., 10 (3): 396-410 (2002)Traffic classification through simple statistical fingerprinting., , , and . Comput. Commun. Rev., 37 (1): 5-16 (2007)Taking a Peek at Bandwidth Usage on Encrypted Links., , , and . ICC, page 1-6. IEEE, (2011)On-line SVM traffic classification., , and . IWCMC, page 1778-1783. IEEE, (2011)Coarse Classification of Internet Traffic Aggregates., , , and . ICC, page 1-6. IEEE, (2010)A scheme for authentication and dynamic key exchange in wireless networks., , , , , , and . Bell Labs Tech. J., 7 (2): 37-48 (2002)