Author of the publication

Preventing DDoS attacks on internet servers exploiting P2P systems.

, , and . Comput. Networks, 54 (15): 2756-2774 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards self adaptive network traffic classification., , , , and . Comput. Commun., (2015)Enabling Confidentiality of Data Delivery in an Overlay Broadcasting System., , , , and . IEEE J. Sel. Areas Commun., 25 (9): 1732-1744 (2007)Leveraging client-side DNS failure patterns to identify malicious behaviors., , , , , , and . CNS, page 406-414. IEEE, (2015)Detecting malicious clients in ISP networks using HTTP connectivity graph and flow information., , , , , , and . ASONAM, page 150-157. IEEE Computer Society, (2014)Approximate matching of persistent LExicon using search-engines for classifying Mobile app traffic., , and . INFOCOM, page 1-9. IEEE, (2016)YouTube everywhere: impact of device and infrastructure synergies on user experience., , , , and . Internet Measurement Conference, page 345-360. ACM, (2011)Preventing DDoS attacks on internet servers exploiting P2P systems., , and . Comput. Networks, 54 (15): 2756-2774 (2010)Per-user policy enforcement on mobile apps through network functions virtualization., , , , , , , and . MobiArch@MobiCom, page 37-42. ACM, (2014)Characterization of community based-P2P systems and implications for traffic localization., , , and . Peer-to-Peer Netw. Appl., 6 (2): 118-133 (2013)MAPPER: A Mobile Application Personal Policy Enforcement Router for Enterprise Networks., , , , , , , and . EWSDN, page 131-132. IEEE Computer Society, (2014)