Author of the publication

Understanding the impact of Denial of Service attacks on Virtual Machines.

, and . IWQoS, page 1-9. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Power consumption of virtual machines with network transactions: Measurement and improvements., , and . INFOCOM, page 1051-1059. IEEE, (2014)Cloud Gaming: Understanding the Support From Advanced Virtualization and Hardware., , and . IEEE Trans. Circuits Syst. Video Techn., 25 (12): 2026-2037 (2015)On GPU Pass-Through Performance for Cloud Gaming: Experiments and Analysis., and . NetGames, page 6:1-6:6. IEEE/ACM, (2013)On Multiple Virtual NICs in Cloud Computing: Performance Bottleneck and Enhancement., , , , and . IEEE Syst. J., 12 (3): 2417-2427 (2018)Bootstrapping Trust in Distributed Systems with Blockchains., , , and . login Usenix Mag., (2016)A Castle of Glass: Leaky IoT Appliances in Modern Smart Homes., , , and . IEEE Wirel. Commun., 25 (6): 32-37 (2018)Cloud gaming: architecture and performance., , , and . IEEE Netw., 27 (4): 1-0 (2013)Performance of Virtual Machines Under Networked Denial of Service Attacks: Experiments and Analysis., and . IEEE Syst. J., 7 (2): 335-345 (2013)Live Broadcast With Community Interactions: Bottlenecks and Optimizations., , , , and . IEEE Trans. Multim., 19 (6): 1184-1194 (2017)Blockstack: A Global Naming and Storage System Secured by Blockchains., , , and . USENIX Annual Technical Conference, page 181-194. USENIX Association, (2016)