Author of the publication

Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration.

, , and . ACM Conference on Computer and Communications Security, page 1595-1606. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Routing for a single interface MCN architecture and pricing schemes for data traffic in multihop cellular networks., , and . ICC, page 969-973. IEEE, (2003)EZ-PC: program committee selection made easy.. Comput. Commun. Rev., 46 (3): 6:1-6:3 (2016)Jaqen: A High-Performance Switch-Native Approach for Detecting and Mitigating Volumetric DDoS Attacks with Programmable Switches., , , , , , , , and . USENIX Security Symposium, page 3829-3846. USENIX Association, (2021)Less pain, most of the gain: incrementally deployable ICN., , , , , , , , and . SIGCOMM, page 147-158. ACM, (2013)Accurately Measuring Global Risk of Amplification Attacks using AmpMap., , , , , and . USENIX Security Symposium, page 3881-3898. USENIX Association, (2021)SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks., , and . NDSS, The Internet Society, (2016)Understanding internet video viewing behavior in the wild., , , and . SIGMETRICS, page 379-380. ACM, (2013)Practical and incremental convergence between sdn and middleboxes, , , , , and . Open Network Summit, Santa Clara, CA, (2013)RareGAN: Generating Samples for Rare Classes., , , and . AAAI, page 7506-7515. AAAI Press, (2022)Lumen: a framework for developing and evaluating ML-based IoT network anomaly detection., , , , and . CoNEXT, page 59-71. ACM, (2022)