Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Preliminary Look at the Privacy of SSH Tunnels., , and . ICCCN, page 626-632. IEEE, (2008)Detection of Encrypted Tunnels Across Network Boundaries., , , and . ICC, page 1738-1744. IEEE, (2008)Pattern Recognition Approaches for Classifying IP Flows., , , , and . SSPR/SPR, volume 5342 of Lecture Notes in Computer Science, page 885-895. Springer, (2008)HAWAII: a domain-based approach for supporting mobility in wide-area wireless networks., , , , , and . IEEE/ACM Trans. Netw., 10 (3): 396-410 (2002)A statistical approach to IP-level classification of network traffic., , , and . ICC, page 170-176. IEEE, (2006)Design and implementation of a WLAN/cdma2000 interworking architecture., , , , , and . IEEE Communications Magazine, 41 (11): 90-100 (2003)An Experimental Evaluation of the Computational Cost of a DPI Traffic Classifier., , , , and . GLOBECOM, page 1-8. IEEE, (2009)Coarse Classification of Internet Traffic Aggregates., , , and . ICC, page 1-6. IEEE, (2010)On-line SVM traffic classification., , and . IWCMC, page 1778-1783. IEEE, (2011)Taking a Peek at Bandwidth Usage on Encrypted Links., , , and . ICC, page 1-6. IEEE, (2011)