Dominik Schatzmann
Dominik Schatzmann
Verified email at
Cited by
Cited by
Wifi-opp: ad-hoc-less opportunistic networking
S Trifunovic, B Distl, D Schatzmann, F Legendre
Proceedings of the 6th ACM workshop on Challenged networks, 37-42, 2011
Modeling the security ecosystem-the dynamics of (in) security
S Frei, D Schatzmann, B Plattner, B Trammell
Economics of Information Security and Privacy, 79-106, 2010
Digging into HTTPS: flow-based classification of webmail traffic
D Schatzmann, W Mühlbauer, T Spyropoulos, X Dimitropoulos
Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 322-327, 2010
The role of network trace anonymization under attack
M Burkhart, D Schatzmann, B Trammell, E Boschi, B Plattner
ACM SIGCOMM Computer Communication Review 40 (1), 5-11, 2010
Accurate network anomaly classification with generalized entropy metrics
B Tellenbach, M Burkhart, D Schatzmann, D Gugelmann, D Sornette
Computer Networks 55 (15), 3485-3502, 2011
Twitter in disaster mode: Security architecture
T Hossmann, P Carta, D Schatzmann, F Legendre, P Gunningberg, ...
Proceedings of the special workshop on internet and disasters, 1-8, 2011
Inferring spammers in the network core
D Schatzmann, M Burkhart, T Spyropoulos
International Conference on Passive and Active Network Measurement, 229-238, 2009
Peeling away timing error in netflow data
B Trammell, B Tellenbach, D Schatzmann, M Burkhart
International Conference on Passive and Active Network Measurement, 194-203, 2011
Identifying Skype traffic in a large-scale flow data repository
B Trammell, E Boschi, G Procissi, C Callegari, P Dorfinger, D Schatzmann
International Workshop on Traffic Monitoring and Analysis, 72-85, 2011
Fact: Flow-based approach for connectivity tracking
D Schatzmann, S Leinen, J Kögel, W Mühlbauer
International Conference on Passive and Active Network Measurement, 214-223, 2011
Network anomaly detection in the cloud: The challenges of virtual service migration
K Adamova, D Schatzmann, B Plattner, P Smith
2014 IEEE International Conference on Communications (ICC), 3770-3775, 2014
Federated flow-based approach for privacy preserving connectivity tracking
M Djatmiko, D Schatzmann, X Dimitropoulos, A Friedman, R Boreli
Proceedings of the ninth ACM conference on Emerging networking experiments …, 2013
Collaborative network outage troubleshooting with secure multiparty computation
M Djatmiko, D Schatzmann, X Dimitropoulos, A Friedman, R Boreli
IEEE Communications Magazine 51 (11), 78-84, 2013
On flow concurrency in the internet and its implications for capacity sharing
B Trammell, D Schatzmann
Proceedings of the 2012 ACM workshop on Capacity sharing, 15-20, 2012
Horizon extender: long-term preservation of data leakage evidence in web traffic
D Gugelmann, D Schatzmann, V Lenders
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
Flow-level characteristics of spam and ham
D Schatzmann, M Burkhart, T Spyropoulos
arXiv preprint arXiv:0808.4104, 2008
On bringing private traffic into public SDN testbeds
V Kotronis, D Schatzmann, B Ager
Proceedings of the second ACM SIGCOMM workshop on Hot topics in software …, 2013
A tale of two outages: A study of the skype network in distress
B Trammell, D Schatzmann
2011 7th International Wireless Communications and Mobile Computing …, 2011
Twitter in disaster mode: smart probing for opportunistic peers
T Hossmann, D Schatzmann, P Carta, F Legendre
Proceedings of the third ACM international workshop on Mobile Opportunistic …, 2012
Evaluation of Scheduling Methods over Multipath Routing in WirelessMobile Ad Hoc Networks
R Gonner, D Schatzmann, B Plattner
Semester Thesis, Inistitute for Technology, Zurich, Germany, SA-2006-26, 2006
The system can't perform the operation now. Try again later.
Articles 1–20