Author of the publication

An empirical evaluation of entropy-based traffic anomaly detection.

, , , , and . Internet Measurement Conference, page 151-156. ACM, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Challenges and solutions for fast remote persistent memory access., , and . SoCC, page 105-119. ACM, (2020)TensorFuzz: Debugging Neural Networks with Coverage-Guided Fuzzing., , , and . ICML, volume 97 of Proceedings of Machine Learning Research, page 4901-4911. PMLR, (2019)Learning to Protect Communications with Adversarial Neural Cryptography., and . CoRR, (2016)Datacenter RPCs can be General and Fast., , and . NSDI, page 1-16. USENIX Association, (2019)Topology inference from BGP routing dynamics., , , and . Internet Measurement Workshop, page 243-248. ACM, (2002)Exact Pattern Matching with Feed-Forward Bloom Filters., and . ALENEX, page 1-12. SIAM, (2011)Resilient Overlay Networks., , , and . SOSP, page 131-145. ACM, (2001)Operating System Review 35(5).SplitScreen: Enabling Efficient, Distributed Malware Detection., , , , , and . NSDI, page 377-390. USENIX Association, (2010)Improving end-to-end availability using overlay networks.. Massachusetts Institute of Technology, Cambridge, MA, USA, (2004)ndltd.org (oai:dspace.mit.edu:1721.1/30159).Safe and effective fine-grained TCP retransmissions for datacenter communication., , , , , , , and . SIGCOMM, page 303-314. ACM, (2009)