Author of the publication

Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management.

, , and . ACNS, volume 3531 of Lecture Notes in Computer Science, page 104-121. (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Perspective on Providing Cloud Computing Security - A Position Paper., , , , and . CLOSER, page 650-655. SciTePress, (2011)Optimal Slice Allocation in 5G Core Networks., and . CoRR, (2018)Improved SDN responsiveness to UDP flood attacks., , and . CNS, page 715-716. IEEE, (2015)Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management., , and . ACNS, volume 3531 of Lecture Notes in Computer Science, page 104-121. (2005)Towards power profiling of Android permissions., , and . NTMS, page 1-5. IEEE, (2015)A Discussion on Security Education in Academia., , , , , and . ACM Conference on Computer and Communications Security, page 2187-2188. ACM, (2018)One Pass Packet Steering (OPPS) for stateless policy chains in multi-subscriber SDN., , and . INFOCOM Workshops, page 408-413. IEEE, (2017)IoT Trust Establishment Through System Level Interactions and Communication Attributes., , , and . GLOBECOM, page 5919-5924. IEEE, (2023)Introducing Adaptive Continuous Adversarial Training (ACAT) to Enhance ML Robustness., , and . CoRR, (2024)Does context influence responses to firewall warnings?, , and . eCrime Researchers Summit, page 1-10. IEEE, (2012)