Martin Burkhart
Martin Burkhart
Zugehörigkeit unbekannt
Bestätigte E-Mail-Adresse bei
TitelZitiert vonJahr
Does topology control reduce interference?
M Burkhart, P Von Rickenbach, R Wattenhofer, A Zollinger
Proceedings of the 5th ACM international symposium on Mobile ad hoc …, 2004
SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics
M Burkhart, M Strasser, D Many, X Dimitropoulos
USENIX Security Symposium, 2010
Beyond shannon: Characterizing internet traffic with generalized entropy metrics
B Tellenbach, M Burkhart, D Sornette, T Maillart
International conference on passive and active network measurement, 239-248, 2009
The role of network trace anonymization under attack
M Burkhart, D Schatzmann, B Trammell, E Boschi, B Plattner
ACM SIGCOMM Computer Communication Review 40 (1), 5-11, 2010
Accurate network anomaly classification with generalized entropy metrics
B Tellenbach, M Burkhart, D Schatzmann, D Gugelmann, D Sornette
Computer Networks 55 (15), 3485-3502, 2011
Fast privacy-preserving top-k queries using secret sharing
M Burkhart, X Dimitropoulos
2010 Proceedings of 19th International Conference on Computer Communications …, 2010
Fast private set operations with sepia
D Many, M Burkhart, X Dimitropoulos
ETZ G93, 2012
Inferring spammers in the network core
D Schatzmann, M Burkhart, T Spyropoulos
International Conference on Passive and Active Network Measurement, 229-238, 2009
Peeling away timing error in netflow data
B Trammell, B Tellenbach, D Schatzmann, M Burkhart
International Conference on Passive and Active Network Measurement, 194-203, 2011
The risk-utility tradeoff for IP address truncation
M Burkhart, D Brauckhoff, M May, E Boschi
Proceedings of the 1st ACM workshop on Network data anonymization, 23-30, 2008
Privacy-preserving distributed network troubleshooting—bridging the gap between theory and practice
M Burkhart, X Dimitropoulos
ACM Transactions on Information and System Security (TISSEC) 14 (4), 31, 2011
Enabling collaborative network security with privacy-preserving data aggregation
M Burkhart
TIK-Schriftenreihe 125, 2011
SEPIA: Security through private information aggregation
M Burkhart, M Strasser, D Many, X Dimitropoulos
Arxiv preprint arXiv:0903.4258, 2009
Analysis of interference in ad-hoc networks
M Burkhart, R Wattenhofer, A Zollinger
Swiss Federal Institute of Technology Zurich, 2003
Flow-level characteristics of spam and ham
D Schatzmann, M Burkhart, T Spyropoulos
arXiv preprint arXiv:0808.4104, 2008
Reduce to the max: A simple approach for Massive-Scale Privacy-Preserving collaborative network measurements (Short paper)
F Ricciato, M Burkhart
International Workshop on Traffic Monitoring and Analysis, 100-107, 2011
On the utility of anonymized flow traces for anomaly detection
M Burkhart, D Brauckhoff, M May
arXiv preprint arXiv:0810.1655, 2008
Elementary secure-multiparty computation for massive-scale collaborative network monitoring: A quantitative assessment
A Iacovazzi, A D’Alconzo, F Ricciato, M Burkhart
Computer networks 57 (17), 3728-3742, 2013
How to Protect Data Privacy in Collaborative Network Security
M Burkhart, X Dimitropoulos
Cybercrime, 38, 2012
SEPIA - User Manual and Developer’s Guide
M Burkhart, D Many, M Widmer
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20