Author of the publication

Tracking Network Events with Write Optimized Data Structures: The Design and Implementation of TWIAD: The Write-Optimized IP Address Database.

, , , , , and . CoRR, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A survey of attack and defense techniques for reputation systems., , and . ACM Comput. Surv., 42 (1): 1:1-1:31 (2009)Steward: Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks., , , , , , , and . IEEE Trans. Dependable Secur. Comput., 7 (1): 80-93 (2010)A Marauder's Map for the IoT Edge., , , and . CIC, page 236-245. IEEE, (2019)Experimental comparison of peer-to-peer streaming overlays: An application perspective., , , and . LCN, page 20-27. IEEE Computer Society, (2008)Tracking Network Events with Write Optimized Data Structures: The Design and Implementation of TWIAD: The Write-Optimized IP Address Database., , , , , and . CoRR, (2015)A Network-Aware Distributed Membership Protocol for Collaborative Defense., , and . CSE (4), page 1123-1130. IEEE Computer Society, (2009)Tracking Network Events with Write Optimized Data Structures., , , , , and . BADGERS@RAID, page 1-7. IEEE, (2015)Utilizing linear subspaces to improve cloud security., and . DSN Workshops, page 1-6. IEEE Computer Society, (2012)Using linkography to understand cyberattacks., , , and . CNS, page 290-298. IEEE, (2015)Robust Decentralized Virtual Coordinate Systems in Adversarial Environments., and . ACM Trans. Inf. Syst. Secur., 13 (4): 38:1-38:34 (2010)