Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Open collaborative hyperpapers: a call to action., , , , , and . Comput. Commun. Rev., 49 (1): 31-33 (2019)Classification of Network Traffic via Packet-Level Hidden Markov Models., , , and . GLOBECOM, page 2138-2142. IEEE, (2008)BGP hijacking classification., , , , and . TMA, page 25-32. IEEE, (2019)Destination Unreachable: Characterizing Internet Outages and Shutdowns., , , , , , , , and . SIGCOMM, page 608-621. ACM, (2023)Towards Improving Outage Detection with Multiple Probing Protocols., , and . PAM (1), volume 14537 of Lecture Notes in Computer Science, page 189-205. Springer, (2024)How to Operate a Meta-Telescope in your Spare Time., , , , , , and . IMC, page 328-343. ACM, (2023)iGDB: connecting the physical and logical layers of the internet., , , , and . IMC, page 433-448. ACM, (2022)Analysis of IPv4 address space utilization with ANT ISI dataset and censys., , and . IMC, page 744-745. ACM, (2022)Analysis of a "/0" stealth scan from a botnet., , , , and . Internet Measurement Conference, page 1-14. ACM, (2012)Leveraging Internet Background Radiation for Opportunistic Network Analysis., , , , and . Internet Measurement Conference, page 423-436. ACM, (2015)