Author of the publication

Mitigating TCP Protocol Misuse With Programmable Data Planes.

, , , , and . IEEE Trans. Netw. Serv. Manag., 18 (1): 760-774 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Monitoring Network Telescopes and Inferring Anomalous Traffic Through the Prediction of Probing Rates., , , and . IEEE Trans. Netw. Serv. Manag., 19 (4): 5170-5182 (December 2022)Comparative Assessment of Process Mining for Supporting IoT Predictive Security., , , , and . IEEE Trans. Netw. Serv. Manag., 18 (1): 1092-1103 (2021)A Survey of HTTPS Traffic and Services Identification Approaches., , , and . CoRR, (2020)HiFiPot: a High-Fidelity Emulation Framework for Internet of Things Honeypots., , and . NOMS, page 1-9. IEEE, (2023)A Holistic Monitoring Service for Fog/Edge Infrastructures: A Foresight Study., , , , and . FiCloud, page 337-344. IEEE Computer Society, (2017)SPONGE: Software-Defined Traffic Engineering to Absorb Influx of Network Traffic., , , , , and . LCN, page 193-201. IEEE, (2019)Defeating Protocol Abuse with P4: Application to Explicit Congestion Notification., , , , and . Networking, page 431-439. IEEE, (2020)Self-Supervised Latent Representations of Network Flows and Application to Darknet Traffic Classification., , , and . IEEE Access, (2023)Early Identification of Services in HTTPS Traffic., , , and . CoRR, (2020)Leveraging in-network real-value computation for home network device recognition., , , and . IM, page 734-735. IEEE, (2021)