Author of the publication

You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks.

, , , , , and . NDSS, The Internet Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Profiling resource usage for mobile applications: a cross-layer approach., , , , , and . MobiSys, page 321-334. ACM, (2011)Multilevel cooperative on-line computing architecture under dispatching cloud., , , , and . IECON, page 339-344. IEEE, (2017)Interactive project review of deformable parts through haptic interfaces in Virtual Reality.. University of Rennes 1, France, (2011)You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks., , , , , and . NDSS, The Internet Society, (2012)TOP: Tail Optimization Protocol For Cellular Radio Resource Allocation., , , , , and . ICNP, page 285-294. IEEE Computer Society, (2010)Restricted Spatial Perception-Based Robotic Unloading System Using Dynamic Grasping Strategy., , , , and . ICRCA, page 161-167. IEEE, (2024)Periodic transfers in mobile applications: network-wide origin, impact, and optimization., , , , , , , and . WWW, page 51-60. ACM, (2012)Demo: mobile application resource optimizer (ARO)., , , , , and . MobiSys, page 369-370. ACM, (2011)Characterizing radio resource allocation for 3G networks., , , , , and . Internet Measurement Conference, page 137-150. ACM, (2010)Cellular data network infrastructure characterization and implication on mobile content placement., , , , , and . SIGMETRICS, page 317-328. ACM, (2011)