Author of the publication

Detecting bogus BGP route information: Going beyond prefix hijacking.

, , , and . SecureComm, page 381-390. IEEE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting bots via incremental LS-SVM learning with dynamic feature adaptation., , and . KDD, page 386-394. ACM, (2011)DoWitcher: Effective Worm Detection and Containment in the Internet Core., , , , , and . INFOCOM, page 2541-2545. IEEE, (2007)Detecting algorithmically generated malicious domain names., , , and . Internet Measurement Conference, page 48-61. ACM, (2010)Measuring serendipity: connecting people, locations and interests in a mobile 3G network., , , and . Internet Measurement Conference, page 267-279. ACM, (2009)High performance distributed Denial-of-Service resilient web cluster architecture., and . NOMS, page 1019-1024. IEEE, (2008)Wide Area Redirection of Dynamic Content by Internet Data Centers., , and . INFOCOM, page 816-826. IEEE, (2004)A Social Network Based Patching Scheme for Worm Containment in Cellular Networks., , , , and . INFOCOM, page 1476-1484. IEEE, (2009)Unconstrained endpoint profiling (googling the internet)., , , and . SIGCOMM, page 279-290. ACM, (2008)Detecting bogus BGP route information: Going beyond prefix hijacking., , , and . SecureComm, page 381-390. IEEE, (2007)BGP eye: a new visualization tool for real-time detection and analysis of BGP anomalies., , , and . VizSEC, page 81-90. ACM, (2006)