Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Revisiting Application Offloads on Programmable Switches., , , and . IFIP Networking, page 1-9. IEEE, (2022)SIERRA: Ranking Anomalous Activities in Enterprise Networks., , , , , and . EuroS&P, page 44-59. IEEE, (2022)Uniform price auction for allocation of dynamic cloud bandwidth., , and . ICC, page 2944-2949. IEEE, (2014)A Flow Scheduler Architecture., , , and . Networking, volume 6091 of Lecture Notes in Computer Science, page 122-134. Springer, (2010)Equilibrium in Size-Based Scheduling Systems., , , and . ASMTA, volume 5513 of Lecture Notes in Computer Science, page 234-248. Springer, (2009)Taking rural BPO to new heights: An ACM for distributed and secure document sharing., , and . IEEE ANTS, page 1-6. IEEE, (2011)Analysis of the Effects of XLFrames in a Network., , , , and . Networking, volume 5550 of Lecture Notes in Computer Science, page 364-377. Springer, (2009)In-Network Applications: Beyond Single Switch Pipelines., , , and . NetSoft, page 1-8. IEEE, (2021)Performance study of TCP flows with QoS-supported OpenFlow in data center networks., , and . ICON, page 1-6. IEEE, (2013)Insider threat detection and its future directions., , , and . Int. J. Secur. Networks, 12 (3): 168-187 (2017)