Author of the publication

Bit vector algorithms enabling high-speed and memory-efficient firewall blacklisting.

, , and . ACM Southeast Regional Conference, ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Supporting H.323 Video and Voice in an Enterprise Network., and . NETA, page 23-30. USENIX Association, (1999)The optimal connection preemption algorithm in a multi-class network., , and . ICC, page 2294-2298. IEEE, (2002)University methodology for internetworking principles and design projects., , and . IEEE Trans. Educ., 46 (2): 218-225 (2003)A distributed firewall and active response architecture providing preemptive protection., , and . ACM Southeast Regional Conference, page 220-225. ACM, (2008)Path selection with class distribution information in the integrated network., , , and . IEEE Communications Letters, 6 (2): 88-90 (2002)Formulation and optimization of the connection preemption problem., and . Comput. Commun., 27 (3): 253-261 (2004)Comparisons of high performance software radios with size, weight, area and power constraints., , , and . WiNTECH, page 17-24. ACM, (2014)Intrusion Detection Testing and Benchmarking Methodologies., , , , and . IWIA, page 63-72. IEEE Computer Society, (2003)Intelligent actor mobility in wireless sensor and actor networks., and . Telecommun. Syst., 40 (3-4): 141-149 (2009)Georgia tech information security center hands-on network security laboratory., , , and . IEEE Trans. Educ., 49 (1): 82-87 (2006)