From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Algorithms For Optimizing Policy-Constrained Routing., , и . IWQoS, стр. 113-116. IEEE, (2007)Zone state revocation for DNSSEC., , , и . LSAD@SIGCOMM, стр. 153-160. ACM, (2007)Incremental Deployment Strategies for Effective Detection and Prevention of BGP Origin Hijacks., , и . ICDCS, стр. 670-679. IEEE Computer Society, (2014)Applying Cybersecurity Challenges to Medical and Vehicular Cyber Physical Systems.. SafeConfig@CCS, стр. 39. ACM, (2017)A coherent moral relativism., , и . Synthese, 166 (2): 413-430 (2009)Epiphany: A location hiding architecture for protecting critical services from DDoS attacks., , и . DSN, стр. 1-12. IEEE Computer Society, (2012)G-RCA: a generic root cause analysis platform for service quality management in large IP networks., , , , , и . CoNEXT, стр. 5. ACM, (2010)DroneScale: drone load estimation via remote passive RF sensing., , , , , , , , , и 2 other автор(ы). SenSys, стр. 326-339. ACM, (2020)Dynamics of Prefix Usage at an Edge Router., , и . PAM, том 6579 из Lecture Notes in Computer Science, стр. 11-20. Springer, (2011)Analyzing the Aftermath of the McColo Shutdown., , , и . SAINT, стр. 157-160. IEEE Computer Society, (2009)