Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding implications of DNS zone provisioning., , and . Internet Measurement Conference, page 211-216. ACM, (2008)A study of malware in peer-to-peer networks., , and . Internet Measurement Conference, page 327-332. ACM, (2006)Packet forwarding with source verification., , and . Comput. Networks, 52 (8): 1567-1582 (2008)On the linkability of complementary information from free versions of people databases., , , , , and . SIGMETRICS Perform. Evaluation Rev., 40 (4): 96-100 (2013)A novel multicast scheduling scheme for multimedia servers with variable access patterns., and . ICC, page 875-879. IEEE, (2003)Prevalence and mitigation of forum spamming., , and . INFOCOM, page 2309-2317. IEEE, (2011)Grid networks and portals - Revisiting web server workload invariants in the context of scientific web sites., , and . SC, page 110. ACM Press, (2006)~Open Resolvers: Understanding the Origins of Anomalous Open DNS Resolvers., and . PAM, volume 8995 of Lecture Notes in Computer Science, page 3-14. Springer, (2015)Touring DNS Open Houses for Trends and Configurations., , and . IEEE/ACM Trans. Netw., 19 (6): 1666-1675 (2011)Exploitable Redirects on the Web: Identification, Prevalence, and Defense., , and . WOOT, USENIX Association, (2008)