Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Packet Forwarding Verification in SDN., , , , and . IEEE Trans. Dependable Secur. Comput., 16 (6): 915-929 (2019)OmniMon: Re-architecting Network Telemetry with Resource Efficiency and Full Accuracy., , , , , and . SIGCOMM, page 404-421. ACM, (2020)VegaNet: a virtualized experimentation platform for production networks with connectivity consistency., , , , and . IEEE Netw., 26 (5): 15-21 (2012)Secure Overlay Cloud Storage with Access Control and Assured Deletion., , , and . IEEE Trans. Dependable Secur. Comput., 9 (6): 903-916 (2012)New Regenerating Codes over Binary Cyclic Codes., , , and . ISIT, page 216-220. IEEE, (2019)Identity attack and anonymity protection for P2P-VoD systems., , and . IWQoS, page 1-9. IEEE, (2011)Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service., , , , , and . ACSAC, page 119-128. ACM, (2012)Single Disk Failure Recovery forX-Code-Based Parallel Storage Systems., , , , , , and . IEEE Trans. Computers, 63 (4): 995-1007 (2014)On the detection of signaling DoS attacks on 3G/WiMax wireless networks., , and . Comput. Networks, 53 (15): 2601-2616 (2009)Live Deduplication Storage of Virtual Machine Images in an Open-Source Cloud., , , , and . Middleware, volume 7049 of Lecture Notes in Computer Science, page 81-100. Springer, (2011)