Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An empirical evaluation of entropy-based traffic anomaly detection., , , , and . Internet Measurement Conference, page 151-156. ACM, (2008)Fighting Fire with Light: A Case for Defending DDoS Attacks Using the Optical Layer., , and . CoRR, (2020)Contention-Aware Performance Prediction For Virtualized Network Functions., , , and . SIGCOMM, page 270-282. ACM, (2020)A Roadmap for Enabling a Future-Proof In-Network Computing Data Plane Ecosystem., , , , , , , , , and . CoRR, (2021)Scalable Testing of Context-Dependent Policies over Stateful Data Planes with Armstrong., , , and . CoRR, (2015)KalKi: A Software-Defined IoT Security Platform., , , , , , , , and . WF-IoT, page 1-6. IEEE, (2020)Verifiable resource accounting for cloud computing services., and . CCSW, page 21-26. ACM, (2011)Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration., , and . ACM Conference on Computer and Communications Security, page 1595-1606. ACM, (2015)Analyzing Third Party Service Dependencies in Modern Web Services: Have We Learned from the Mirai-Dyn Incident?, , and . Internet Measurement Conference, page 634-647. ACM, (2020)Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things., , , , and . HotNets, page 5:1-5:7. ACM, (2015)