Author of the publication

You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks.

, , , , , and . NDSS, The Internet Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Profiling resource usage for mobile applications: a cross-layer approach., , , , , and . MobiSys, page 321-334. ACM, (2011)Interactive project review of deformable parts through haptic interfaces in Virtual Reality.. University of Rennes 1, France, (2011)Multilevel cooperative on-line computing architecture under dispatching cloud., , , , and . IECON, page 339-344. IEEE, (2017)Demo: mobile application resource optimizer (ARO)., , , , , and . MobiSys, page 369-370. ACM, (2011)Cellular data network infrastructure characterization and implication on mobile content placement., , , , , and . SIGMETRICS, page 317-328. ACM, (2011)Characterizing radio resource allocation for 3G networks., , , , , and . Internet Measurement Conference, page 137-150. ACM, (2010)Accurate online power estimation and automatic battery behavior based power model generation for smartphones., , , , , , and . CODES+ISSS, page 105-114. ACM, (2010)An untold story of middleboxes in cellular networks., , , , and . SIGCOMM, page 374-385. ACM, (2011)Periodic transfers in mobile applications: network-wide origin, impact, and optimization., , , , , , , and . WWW, page 51-60. ACM, (2012)You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks., , , , , and . NDSS, The Internet Society, (2012)