Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

One-Way Traffic Monitoring with iatmon.. PAM, volume 7192 of Lecture Notes in Computer Science, page 179-188. Springer, (2012)Traffic Flow Measurement: Experiences with NeTraMet.. RFC, (March 1997)SVG Drawings for RFCs: SVG 1.2 RFC.. RFC, (December 2016)Certificate Revocation Guard (CRG): An Efficient Mechanism for Checking Certificate Revocation., , and . LCN, page 527-530. IEEE Computer Society, (2016)Evaluating network intrusion detection systems for high-speed networks., , and . ITNAC, page 1-6. IEEE Computer Society, (2017)A Study of Burstiness in TCP Flows., , and . PAM, volume 3431 of Lecture Notes in Computer Science, page 13-26. Springer, (2005)New Zealand Experiences with Network Traffic Charging. ConneXions, (December 1994)Available from URL: http://www.auckland.ac.nz/net/Accounting/nze.html.RFC Series Format Requirements and Future Development., and . RFC, (May 2013)RTFM: Applicability Statement.. RFC, (October 1999)Expectations for Computer Security Incident Response., and . RFC, (June 1998)