Does topology control reduce interference? M Burkhart, P Von Rickenbach, R Wattenhofer, A Zollinger Proceedings of the 5th ACM international symposium on Mobile ad hoc …, 2004 | 810 | 2004 |
SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics M Burkhart, M Strasser, D Many, X Dimitropoulos USENIX Security Symposium, 2010 | 458 | 2010 |
The role of network trace anonymization under attack M Burkhart, D Schatzmann, B Trammell, E Boschi, B Plattner ACM SIGCOMM Computer Communication Review 40 (1), 5-11, 2010 | 78 | 2010 |
Fast private set operations with sepia D Many, M Burkhart, X Dimitropoulos ETZ G93, 2012 | 76 | 2012 |
Beyond shannon: Characterizing internet traffic with generalized entropy metrics B Tellenbach, M Burkhart, D Sornette, T Maillart Passive and Active Network Measurement: 10th International Conference, PAM …, 2009 | 70 | 2009 |
Accurate network anomaly classification with generalized entropy metrics B Tellenbach, M Burkhart, D Schatzmann, D Gugelmann, D Sornette Computer Networks 55 (15), 3485-3502, 2011 | 64 | 2011 |
Fast privacy-preserving top-k queries using secret sharing M Burkhart, X Dimitropoulos 2010 Proceedings of 19th International Conference on Computer Communications …, 2010 | 56 | 2010 |
The risk-utility tradeoff for IP address truncation M Burkhart, D Brauckhoff, M May, E Boschi Proceedings of the 1st ACM workshop on Network data anonymization, 23-30, 2008 | 44 | 2008 |
Inferring spammers in the network core D Schatzmann, M Burkhart, T Spyropoulos International Conference on Passive and Active Network Measurement, 229-238, 2009 | 31 | 2009 |
Peeling away timing error in netflow data B Trammell, B Tellenbach, D Schatzmann, M Burkhart International Conference on Passive and Active Network Measurement, 194-203, 2011 | 30 | 2011 |
Pascal von Rickenbach, Roger Wattenhofer, and Aaron Zollinger. Does topology control reduce interference M Burkhart MobiHoc’04: Proceedings of the 5th ACM international symposium on Mobile ad …, 0 | 27 | |
Privacy-preserving distributed network troubleshooting—bridging the gap between theory and practice M Burkhart, X Dimitropoulos ACM Transactions on Information and System Security (TISSEC) 14 (4), 1-30, 2008 | 22 | 2008 |
Enabling collaborative network security with privacy-preserving data aggregation M Burkhart TIK-Schriftenreihe 125, 2011 | 16 | 2011 |
On the utility of anonymized flow traces for anomaly detection M Burkhart, D Brauckhoff, M May arXiv preprint arXiv:0810.1655, 2008 | 14 | 2008 |
SEPIA: Security through private information aggregation M Burkhart, M Strasser, D Many, X Dimitropoulos Arxiv preprint arXiv:0903.4258, 2009 | 12 | 2009 |
Analysis of interference in ad-hoc networks M Burkhart, R Wattenhofer, A Zollinger Master's thesis, Swiss Federal Institute of Technology, Zurich, 2003 | 9 | 2003 |
Reduce to the Max: A Simple Approach for Massive-Scale Privacy-Preserving Collaborative Network Measurements (Short Paper) F Ricciato, M Burkhart International Workshop on Traffic Monitoring and Analysis, 100-107, 2011 | 8 | 2011 |
Flow-level characteristics of spam and ham D Schatzmann, M Burkhart, T Spyropoulos arXiv preprint arXiv:0808.4104, 2008 | 8 | 2008 |
Elementary secure-multiparty computation for massive-scale collaborative network monitoring: A quantitative assessment A Iacovazzi, A D’Alconzo, F Ricciato, M Burkhart Computer Networks 57 (17), 3728-3742, 2013 | 4 | 2013 |
Invasion of privacy using fingerprinting attacks D Sauter, M Burkhart, D Schatzmann, B Plattner Master Thesis MA-2008-22, ETH Zurich, 2009 | 4 | 2009 |