Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Is it time for a 999-like (or 112/911) system for critical information servicesƒ., , and . NOMS, page 1-6. IEEE, (2020)Aggregate Cyber-Risk Management in the IoT Age: Cautionary Statistics for (Re)Insurers and Likes., , , , , , , , and . CoRR, (2021)Dissecting the Performance of Satellite Network Operators., , , , and . CoRR, (2023)Tackling spam in the era of end-to-end encryption: A case study of WhatsApp., , , , , and . CoRR, (2021)Mapathons and Hackathons to Crowdsource the Generation and Usage of Geographic Data., , , , , , and . ICGJ, page 9:1-9:5. ACM, (2019)Exploring content moderation in the decentralised web: the pleroma case., , , , , , and . CoNEXT, page 328-335. ACM, (2021)Toxicity in the Decentralized Web and the Potential for Model Sharing., , , , , , and . SIGMETRICS (Abstracts), page 15-16. ACM, (2022)Differential Tracking Across Topical Webpages of Indian News Media., , , , , , and . WebSci, page 299-308. ACM, (2021)SpinThrift: saving energy in viral workloads., and . Green Networking, page 69-76. ACM, (2010)Towards a taxonomy of differentiated service classes in the 5G era., , and . 5G World Forum, page 129-134. IEEE, (2018)