Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TaRad: A Thing-Centric Sensing System for Detecting Activities of Daily Living., , , , and . IDCS, volume 11874 of Lecture Notes in Computer Science, page 357-368. Springer, (2019)Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark, , , and . 29th International Teletraffic Congress (ITC 29), Genoa, Italy, (2017)Internet Censorship in Italy: A First Look at 3G/4G Networks., , and . CANS, volume 10052 of Lecture Notes in Computer Science, page 737-742. (2016)Characterizing and Modeling Traffic of Communication and Collaboration Apps Bloomed With COVID-19 Outbreak., , , , , and . RTSI, page 400-405. IEEE, (2021)Available bandwidth measurement in software defined networks., , , , and . SAC, page 651-657. ACM, (2016)Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark, , , and . 29th International Teletraffic Congress (ITC 29), Genoa, Italy, (2017)An experimental evaluation of the impact of heterogeneous scenarios and virtualization on the available bandwidth estimation tools., , , and . M&N, page 1-6. IEEE, (2017)Internet censorship in Italy: An analysis of 3G/4G networks., , and . ICC, page 1-6. IEEE, (2017)Analyzing internet censorship in Pakistan., , , , , and . RTSI, page 1-6. IEEE, (2016)Know your Big Data Trade-offs when Classifying Encrypted Mobile Traffic with Deep Learning., , , , and . TMA, page 121-128. IEEE, (2019)