Author of the publication

A Policy-Aware Enforcement Logic for Appropriately Invoking Network Coding.

, , , , , and . IEEE/ACM Trans. Netw., 24 (4): 2005-2018 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Streaming Lower Quality Video over LTE: How Much Energy Can You Save?, , , and . ICNP, page 156-167. IEEE Computer Society, (2015)BOLT: realizing high throughput power line communication networks., , , , and . CoNEXT, page 39:1-39:13. ACM, (2015)Malicious co-residency on the cloud: Attacks and defense., , , , , and . INFOCOM, page 1-9. IEEE, (2017)Performance and Security Problems in Today's Networks.. University of California, Riverside, USA, (2016)base-search.net (ftcdlib:qt322653h2).Automated cross layer feature selection for effective intrusion detection in networked systems., , , , , , , , , and . CNS, page 270-278. IEEE, (2016)Jaal: Towards Network Intrusion Detection at ISP Scale., , , , , , , , and . CoNEXT, page 134-146. ACM, (2017)A source authentication scheme using network coding., , and . Int. J. Secur. Networks, 6 (2/3): 101-111 (2011)RUFC: A flexible framework for reliable UDP with flow control., and . ICITST, page 276-281. IEEE, (2013)Detection of stealthy TCP-based DoS attacks., , , , , , , and . MILCOM, page 348-353. IEEE, (2015)Packet Header Obfuscation Using MIMO., , , , , , , and . IEEE/ACM Trans. Netw., 28 (4): 1712-1725 (2020)