Author of the publication

History-Based Throttling of Distributed Denial-of-Service Attacks.

, , , and . ICETE (Selected Papers), volume 990 of Communications in Computer and Information Science, page 199-223. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Bezawada, Bruhadeshwar
add a person with the name Bezawada, Bruhadeshwar
 

Other publications of authors with the same name

AGBuilder: An AI Tool for Automated Attack Graph Building, Analysis, and Refinement., , and . DBSec, volume 11559 of Lecture Notes in Computer Science, page 23-42. Springer, (2019)An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System., and . J. Medical Systems, 37 (5): 9969 (2013)History-Based Throttling of Distributed Denial-of-Service Attacks., , , and . ICETE (Selected Papers), volume 990 of Communications in Computer and Information Science, page 199-223. Springer, (2017)Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough., , and . ESORICS, volume 5283 of Lecture Notes in Computer Science, page 82-96. Springer, (2008)Scaling & fuzzing: Personal image privacy from automated attacks in mobile cloud computing., , , and . J. Inf. Secur. Appl., (2021)Directed adversarial sampling attacks on phishing detection., , , and . J. Comput. Secur., 29 (1): 1-23 (2021)Rekeying and Storage Cost for Multiple User Revocation., and . NDSS, The Internet Society, (2005)A Biometric-Based User Authentication Scheme for Heterogeneous Wireless Sensor Networks., and . AINA Workshops, page 291-296. IEEE Computer Society, (2013)Behavioral Fingerprinting of IoT Devices., , , , , and . ASHES@CCS, page 41-50. ACM, (2018)Cross-Domain Privacy-Preserving Cooperative Firewall Optimization., , and . IEEE/ACM Trans. Netw., 21 (3): 857-868 (2013)