Author of the publication

Accurately Measuring Global Risk of Amplification Attacks using AmpMap.

, , , , , and . USENIX Security Symposium, page 3881-3898. USENIX Association, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Flexible multimedia content retrieval using InfoNames., , , , , and . SIGCOMM, page 455-456. ACM, (2010)A Control-Theoretic Approach for Dynamic Adaptive Video Streaming over HTTP., , , and . SIGCOMM, page 325-338. ACM, (2015)Understanding the impact of video quality on user engagement., , , , , , , and . SIGCOMM, page 362-373. ACM, (2011)Analyzing large DDoS attacks using multiple data sources., , , , and . LSAD@SIGCOMM, page 161-168. ACM, (2006)Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things., , , , and . HotNets, page 5:1-5:7. ACM, (2015)C3: Internet-Scale Control Plane for Video Quality Optimization., , , , , , , and . NSDI, page 131-144. USENIX Association, (2015)An empirical evaluation of entropy-based traffic anomaly detection., , , , and . Internet Measurement Conference, page 151-156. ACM, (2008)CANNON: Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers., , , and . SP, page 195-210. IEEE, (2021)On the Security of Thread Networks: Experimentation with OpenThread-Enabled Devices., , and . WISEC, page 233-244. ACM, (2022)Analyzing the potential benefits of CDN augmentation strategies for internet video workloads., , , and . Internet Measurement Conference, page 43-56. ACM, (2013)