Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Streaming Lower Quality Video over LTE: How Much Energy Can You Save?, , , and . ICNP, page 156-167. IEEE Computer Society, (2015)BOLT: realizing high throughput power line communication networks., , , , and . CoNEXT, page 39:1-39:13. ACM, (2015)Catch Me if You Can: A Closer Look at Malicious Co-Residency on the Cloud., , , , , and . IEEE/ACM Trans. Netw., 27 (2): 560-576 (2019)Malicious co-residency on the cloud: Attacks and defense., , , , , and . INFOCOM, page 1-9. IEEE, (2017)Performance and Security Problems in Today's Networks.. University of California, Riverside, USA, (2016)base-search.net (ftcdlib:qt322653h2).Jaal: Towards Network Intrusion Detection at ISP Scale., , , , , , , , and . CoNEXT, page 134-146. ACM, (2017)Automated cross layer feature selection for effective intrusion detection in networked systems., , , , , , , , , and . CNS, page 270-278. IEEE, (2016)RUFC: A flexible framework for reliable UDP with flow control., and . ICITST, page 276-281. IEEE, (2013)Detection of stealthy TCP-based DoS attacks., , , , , , , and . MILCOM, page 348-353. IEEE, (2015)Packet Header Obfuscation Using MIMO., , , , , , , and . IEEE/ACM Trans. Netw., 28 (4): 1712-1725 (2020)