Suivre
Martin Burkhart
Martin Burkhart
Cyber-Defence Campus, Switzerland
Adresse e-mail validée de ar.admin.ch
Titre
Citée par
Citée par
Année
Does topology control reduce interference?
M Burkhart, P Von Rickenbach, R Wattenhofer, A Zollinger
Proceedings of the 5th ACM international symposium on Mobile ad hoc …, 2004
8172004
SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics
M Burkhart, M Strasser, D Many, X Dimitropoulos
USENIX Security Symposium, 2010
4392010
The role of network trace anonymization under attack
M Burkhart, D Schatzmann, B Trammell, E Boschi, B Plattner
ACM SIGCOMM Computer Communication Review 40 (1), 5-11, 2010
722010
Fast private set operations with sepia
D Many, M Burkhart, X Dimitropoulos
ETZ G93, 2012
702012
Beyond shannon: Characterizing internet traffic with generalized entropy metrics
B Tellenbach, M Burkhart, D Sornette, T Maillart
Passive and Active Network Measurement: 10th International Conference, PAM …, 2009
682009
Accurate network anomaly classification with generalized entropy metrics
B Tellenbach, M Burkhart, D Schatzmann, D Gugelmann, D Sornette
Computer Networks 55 (15), 3485-3502, 2011
622011
Fast privacy-preserving top-k queries using secret sharing
M Burkhart, X Dimitropoulos
2010 Proceedings of 19th International Conference on Computer Communications …, 2010
552010
The risk-utility tradeoff for IP address truncation
M Burkhart, D Brauckhoff, M May, E Boschi
Proceedings of the 1st ACM workshop on Network data anonymization, 23-30, 2008
432008
Inferring spammers in the network core
D Schatzmann, M Burkhart, T Spyropoulos
Passive and Active Network Measurement: 10th International Conference, PAM …, 2009
322009
Peeling away timing error in netflow data
B Trammell, B Tellenbach, D Schatzmann, M Burkhart
Passive and Active Measurement: 12th International Conference, PAM 2011 …, 2011
292011
Pascal von Rickenbach, Roger Wattenhofer, and Aaron Zollinger. Does topology control reduce interference
M Burkhart
MobiHoc’04: Proceedings of the 5th ACM international symposium on Mobile ad …, 0
26
Privacy-preserving distributed network troubleshooting—bridging the gap between theory and practice
M Burkhart, X Dimitropoulos
ACM Transactions on Information and System Security (TISSEC) 14 (4), 1-30, 2008
232008
Enabling collaborative network security with privacy-preserving data aggregation
M Burkhart
TIK-Schriftenreihe 125, 2011
152011
On the utility of anonymized flow traces for anomaly detection
M Burkhart, D Brauckhoff, M May
arXiv preprint arXiv:0810.1655, 2008
142008
SEPIA: Security through private information aggregation
M Burkhart, M Strasser, D Many, X Dimitropoulos
Arxiv preprint arXiv:0903.4258, 2009
122009
Reduce to the max: A simple approach for Massive-Scale Privacy-Preserving collaborative network measurements (Short paper)
F Ricciato, M Burkhart
International Workshop on Traffic Monitoring and Analysis, 100-107, 2011
92011
Analysis of interference in ad-hoc networks
M Burkhart, R Wattenhofer, A Zollinger
Master's thesis, Swiss Federal Institute of Technology, Zurich, 2003
92003
Flow-level characteristics of spam and ham
D Schatzmann, M Burkhart, T Spyropoulos
arXiv preprint arXiv:0808.4104, 2008
82008
Elementary secure-multiparty computation for massive-scale collaborative network monitoring: A quantitative assessment
A Iacovazzi, A D’Alconzo, F Ricciato, M Burkhart
Computer Networks 57 (17), 3728-3742, 2013
42013
Invasion of privacy using fingerprinting attacks
D Sauter, M Burkhart, D Schatzmann, B Plattner
Master Thesis MA-2008-22, ETH Zurich, 2009
42009
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20