Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Untangling the world-wide mesh of undersea cables., , and . HotNets, page 78-84. ACM, (2018)ADMIRE: Anomaly detection method using entropy-based PCA with three-step sketches., , , and . Comput. Commun., 36 (5): 575-588 (2013)Mining anomalous electricity consumption using Ensemble Empirical Mode Decomposition., , , , and . ICASSP, page 5238-5242. IEEE, (2013)Online Empirical Mode Decomposition., , and . ICASSP, page 4306-4310. IEEE, (2017)Metis: Better Atlas Vantage Point Selection for Everyone., , and . TMA, IFIP, (2022)Pinpointing delay and forwarding anomalies using large-scale traceroute measurements., , , and . Internet Measurement Conference, page 15-28. ACM, (2017)Uncovering Relations between Traffic Classifiers and Anomaly Detectors via Graph Theory., , , and . TMA, volume 6003 of Lecture Notes in Computer Science, page 101-114. Springer, (2010)Towards characterizing international routing detours., , and . AINTEC, page 17-24. ACM, (2016)Increasing reliability in network traffic anomaly detection.. Graduate University for Advanced Studies, Japan, (2011)Following the Data Trail: An Analysis of IXP Dependencies., , and . PAM (2), volume 14538 of Lecture Notes in Computer Science, page 199-227. Springer, (2024)