Author of the publication

DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection.

, , , and . INFOCOM, IEEE, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High performance distributed Denial-of-Service resilient web cluster architecture., and . NOMS, page 1019-1024. IEEE, (2008)Measuring serendipity: connecting people, locations and interests in a mobile 3G network., , , and . Internet Measurement Conference, page 267-279. ACM, (2009)Detecting algorithmically generated malicious domain names., , , and . Internet Measurement Conference, page 48-61. ACM, (2010)High-Performance Resource Allocation and Request Redirection Algorithms for Web Clusters., and . IEEE Trans. Parallel Distributed Syst., 19 (9): 1186-1200 (2008)Taming the Mobile Data Deluge With Drop Zones., , , and . IEEE/ACM Trans. Netw., 20 (4): 1010-1023 (2012)Detecting bots via incremental LS-SVM learning with dynamic feature adaptation., , and . KDD, page 386-394. ACM, (2011)DoWitcher: Effective Worm Detection and Containment in the Internet Core., , , , , and . INFOCOM, page 2541-2545. IEEE, (2007)Wide Area Redirection of Dynamic Content by Internet Data Centers., , and . INFOCOM, page 816-826. IEEE, (2004)A Social Network Based Patching Scheme for Worm Containment in Cellular Networks., , , , and . INFOCOM, page 1476-1484. IEEE, (2009)DDoS-shield: DDoS-resilient scheduling to counter application layer attacks., , , , and . IEEE/ACM Trans. Netw., 17 (1): 26-39 (2009)