Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Preliminary Look at the Privacy of SSH Tunnels., , and . ICCCN, page 626-632. IEEE, (2008)Detection of Encrypted Tunnels Across Network Boundaries., , , and . ICC, page 1738-1744. IEEE, (2008)Stream-monitoring with blockmon: convergence of network measurements and data analytics platforms., , , and . Comput. Commun. Rev., 43 (2): 29-36 (2013)Estimating routing symmetry on single links by passive flow measurements., , and . IWCMC, page 473-478. ACM, (2010)Fault-Tolerant Streaming Computation with BlockMon., , , , and . GLOBECOM, page 1-7. IEEE, (2015)Tunnel Hunter: Detecting application-layer tunnels with statistical fingerprinting., , , and . Comput. Networks, 53 (1): 81-97 (2009)Quantifying the accuracy of the ground truth associated with Internet traffic traces., , and . Comput. Networks, 55 (5): 1158-1167 (2011)Measuring and Troubleshooting the Internet: Algorithms, Tools and Applications., , , , and . IEEE J. Sel. Areas Commun., 34 (6): 1805-1806 (2016)Position Paper: Reactive Logic in Software-Defined Networking: Accounting for the Limitations of the Switches., and . EWSDN, page 97-102. IEEE Computer Society, (2014)Detecting HTTP Tunnels with Statistical Mechanisms., , , and . ICC, page 6162-6168. IEEE, (2007)