2009 |
8 | EE | Dominik Schatzmann,
Martin Burkhart,
Thrasyvoulos Spyropoulos:
Inferring Spammers in the Network Core.
PAM 2009: 229-238 |
7 | EE | Bernhard Tellenbach,
Martin Burkhart,
Didier Sornette,
Thomas Maillart:
Beyond Shannon: Characterizing Internet Traffic with Generalized Entropy Metrics.
PAM 2009: 239-248 |
6 | EE | Martin Burkhart,
Mario Strasser,
Xenofontas Dimitropoulos:
SEPIA: Security through Private Information Aggregation
CoRR abs/0903.4258: (2009) |
5 | EE | Martin Burkhart,
Daniela Brauckhoff,
Martin May,
Elisa Boschi:
The Risk-Utility Tradeoff for IP Address Truncation
CoRR abs/0903.4266: (2009) |
2008 |
4 | EE | Martin Burkhart,
Daniela Brauckhoff,
Martin May,
Elisa Boschi:
The risk-utility tradeoff for IP address truncation.
NDA 2008: 23-30 |
3 | EE | Dominik Schatzmann,
Martin Burkhart,
Thrasyvoulos Spyropoulos:
Flow-level Characteristics of Spam and Ham
CoRR abs/0808.4104: (2008) |
2 | EE | Martin Burkhart,
Daniela Brauckhoff,
Martin May:
On the Utility of Anonymized Flow Traces for Anomaly Detection
CoRR abs/0810.1655: (2008) |
2004 |
1 | EE | Martin Burkhart,
Pascal von Rickenbach,
Roger Wattenhofer,
Aaron Zollinger:
Does topology control reduce interference?
MobiHoc 2004: 9-19 |