Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Back in control - An extensible middle-box on your phone., , , , , , and . CoRR, (2020)Identifying traffic differentiation on cellular data networks., , , , , and . SIGCOMM, page 119-120. ACM, (2014)ICLab: A Global, Longitudinal Internet Censorship Measurement Platform., , , , , , and . SP, page 135-151. IEEE, (2020)A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomography., , , and . CoNEXT, page 81-87. ACM, (2017)An Analysis of Pre-installed Android Software., , , , and . SP, page 1039-1055. IEEE, (2020)An Analysis of Pre-installed Android Software., , , , and . CoRR, (2019)Identifying Traffic Differentiation in Mobile Networks., , , , , , , and . Internet Measurement Conference, page 239-251. ACM, (2015)Internet Outages, the Eyewitness Accounts: Analysis of the Outages Mailing List., , , , , , and . PAM, volume 8995 of Lecture Notes in Computer Science, page 206-219. Springer, (2015)Coming of Age: A Longitudinal Study of TLS Deployment., , , , , and . Internet Measurement Conference, page 415-428. ACM, (2018)A comparative analysis of certificate pinning in Android & iOS., , , , , , , , , and . IMC, page 605-618. ACM, (2022)