Martin Burkhart

According to our database1, Martin Burkhart authored at least 18 papers between 2004 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Elementary secure-multiparty computation for massive-scale collaborative network monitoring: A quantitative assessment.
Comput. Networks, 2013

2012
How to Protect Data Privacy in Collaborative Network Security.
ERCIM News, 2012

2011
Enabling collaborative network security with privacy-preserving data aggregation.
PhD thesis, 2011

Privacy-preserving distributed network troubleshooting - bridging the gap between theory and practice.
ACM Trans. Inf. Syst. Secur., 2011

Reduce to the Max: A Simple Approach for Massive-Scale Privacy-Preserving Collaborative Network Measurements (Extended Version)
CoRR, 2011

Accurate network anomaly classification with generalized entropy metrics.
Comput. Networks, 2011

Reduce to the Max: A Simple Approach for Massive-Scale Privacy-Preserving Collaborative Network Measurements (Short Paper).
Proceedings of the Traffic Monitoring and Analysis - Third International Workshop, 2011

Peeling Away Timing Error in NetFlow Data.
Proceedings of the Passive and Active Measurement - 12th International Conference, 2011

2010
The role of network trace anonymization under attack.
Comput. Commun. Rev., 2010

SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics.
Proceedings of the 19th USENIX Security Symposium, 2010

Fast Privacy-Preserving Top-k Queries Using Secret Sharing.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010

2009
SEPIA: Security through Private Information Aggregation
CoRR, 2009

Beyond Shannon: Characterizing Internet Traffic with Generalized Entropy Metrics.
Proceedings of the Passive and Active Network Measurement, 10th International Conference, 2009

Inferring Spammers in the Network Core.
Proceedings of the Passive and Active Network Measurement, 10th International Conference, 2009

2008
On the Utility of Anonymized Flow Traces for Anomaly Detection
CoRR, 2008

Flow-level Characteristics of Spam and Ham
CoRR, 2008

The risk-utility tradeoff for IP address truncation.
Proceedings of the 1st ACM workshop on Network Data Anonymization, 2008

2004
Does topology control reduce interference?
Proceedings of the 5th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2004


  Loading...