Author of the publication

Gaining insight into AS-level outages through analysis of Internet Background Radiation.

, , , and . INFOCOM Workshops, page 447-452. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gaining insight into AS-level outages through analysis of Internet Background Radiation., , , and . INFOCOM Workshops, page 447-452. IEEE, (2013)Gaining insight into AS-level outages through analysis of internet background radiation., , , and . StudentWorkshop@CoNEXT, page 63-64. ACM, (2012)Do you know where your cloud files are?, , and . CCSW, page 73-82. ACM, (2011)The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions., , and . IACR Cryptology ePrint Archive, (2012)Using adaptive lossless compression to characterize network traffic., and . CISS, page 276-277. IEEE, (2009)Leveraging Internet Background Radiation for Opportunistic Network Analysis., , , , and . Internet Measurement Conference, page 423-436. ACM, (2015)Inferring Carrier-Grade NAT Deployment in the Wild., , , , and . INFOCOM, page 2249-2257. IEEE, (2018)The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions., , and . CT-RSA, volume 7779 of Lecture Notes in Computer Science, page 310-325. Springer, (2013)Leveraging Internet Background Radiation for Opportunistic Network Analysis.. University of California, San Diego, USA, (2016)Competitive analysis of online traffic grooming in WDM rings., , , and . IEEE/ACM Trans. Netw., 16 (4): 984-997 (2008)