Author of the publication

On the detection of signaling DoS attacks on 3G/WiMax wireless networks.

, , and . Comput. Networks, 53 (15): 2601-2616 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rack-Aware Regenerating Codes for Data Centers., , , and . IEEE Trans. Inf. Theory, 65 (8): 4730-4745 (2019)Cross-Rack-Aware Single Failure Recovery for Clustered File Systems., , , and . IEEE Trans. Dependable Secur. Comput., 17 (2): 248-261 (2020)LD-Sketch: A distributed sketching design for accurate and scalable anomaly detection in network data streams., and . INFOCOM, page 1420-1428. IEEE, (2014)Toward Optimal Network Fault Correction via End-to-End Inference., , and . INFOCOM, page 1343-1351. IEEE, (2007)Sketchlearn: relieving user burdens in approximate measurement with automated statistical inference., , and . SIGCOMM, page 576-590. ACM, (2018)Achieving Unified Protection for IP Routing., , , , , and . ICCCN, page 1-6. IEEE, (2010)An Algebraic Approach to Computing the Reliability of Internet Routing., , , , and . ICCCN, page 1-6. IEEE, (2011)Triple-fault-tolerant binary MDS array codes with asymptotically optimal repair., , , and . ISIT, page 839-843. IEEE, (2017)Opportunistic use of client repeaters to improve performance of WLANs., , , , , , and . CoNEXT, page 29. ACM, (2008)FADE: Secure Overlay Cloud Storage with File Assured Deletion., , , and . SecureComm, volume 50 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 380-397. Springer, (2010)