From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Dynamics of Prefix Usage at an Edge Router., , и . PAM, том 6579 из Lecture Notes in Computer Science, стр. 11-20. Springer, (2011)Detecting encrypted botnet traffic., , и . INFOCOM, стр. 3453-3458. IEEE, (2013)Identifying BGP routing table transfers., , , и . Comput. Networks, 55 (3): 636-649 (2011)Analyzing the Aftermath of the McColo Shutdown., , , и . SAINT, стр. 157-160. IEEE Computer Society, (2009)Fault Detection in Routing Protocols., и . ICNP, стр. 31-42. IEEE Computer Society, (1999)Behavior of DNS' Top Talkers, a .com/.net View., , , , и . PAM, том 7192 из Lecture Notes in Computer Science, стр. 211-220. Springer, (2012)A taxonomy of capabilities based DDoS defense architectures., , и . AICCSA, стр. 157-164. IEEE Computer Society, (2011)Reliably, Securely and Efficiently Distributing Electronic Content Using Multicasting., , , и . EC-Web, том 3590 из Lecture Notes in Computer Science, стр. 327-336. Springer, (2005)A flexible multicast routing protocol for group communication., , , и . Comput. Networks, 32 (1): 35-60 (2000)Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback., , и . IFIP Int. Conf. Digital Forensics, том 194 из IFIP, стр. 165-176. Springer, (2005)