Author of the publication

Is sampled data sufficient for anomaly detection?

, , , , and . Internet Measurement Conference, page 165-176. ACM, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Failure inferencing based fast rerouting for handling transient link and node failures., , , , , and . INFOCOM, page 2859-2863. IEEE, (2005)MeasuRouting: A Framework for Routing Assisted Traffic Monitoring., , , , and . INFOCOM, page 1271-1279. IEEE, (2010)Graceful Network Operations., , and . INFOCOM, page 289-297. IEEE, (2009)Capacity growth of multi-element arrays in indoor and outdoor wireless channels., , , , , and . WCNC, page 1340-1344. IEEE, (2000)Uncovering the footprints of malicious traffic in wireless/mobile networks., , , , , and . Comput. Commun., (2016)Fast local rerouting for handling transient link failures., , , , and . IEEE/ACM Trans. Netw., 15 (2): 359-372 (2007)Avoiding Transient Loops Through Interface-Specific Forwarding., , , , , , and . IWQoS, volume 3552 of Lecture Notes in Computer Science, page 219-232. Springer, (2005)Overlay Networks: Applications, Coexistence with IP Layer, and Transient Dynamics., and . Algorithms for Next Generation Networks, Springer, (2010)Ghostbusting Facebook: Detecting and Characterizing Phantom Profiles in Online Social Gaming Applications., , , and . WOSN, USENIX Association, (2010)Towards accurate online traffic matrix estimation in software-defined networks., , , , , and . SOSR, page 26:1-26:7. ACM, (2015)