Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A scalable approach to IP anycast security., and . Communication, Network, and Information Security, page 179-184. IASTED/ACTA Press, (2006)Using Proximity Information for Load Balancing in Geographically Distributed Web Server Systems., , and . EurAsia-ICT, volume 2510 of Lecture Notes in Computer Science, page 659-666. Springer, (2002)DTP: An Efficient Transport Protocol., and . NETWORKS, volume C-13 of IFIP Transactions, page 171-180. North-Holland, (1992)WebCaL - a domain specific language for web caching., , , , , , and . Comput. Commun., 24 (2): 191-201 (2001)Combating DDoS Attacks in the Cloud: Requirements, Trends, and Future Directions., , , , , and . IEEE Cloud Comput., 4 (1): 22-32 (2017)Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks., , , , and . IEEE Trans. Dependable Secur. Comput., 15 (6): 959-973 (2018)Turning 802.11 inside-out., , and . Comput. Commun. Rev., 34 (1): 33-38 (2004)DDoS/EDoS attack in cloud: affecting everyone out there!, , and . SIN, page 169-176. ACM, (2015)Location determination of a mobile device using IEEE 802.11b access point signals., , , and . WCNC, page 1987-1992. IEEE, (2003)DDoS attacks in cloud computing: Issues, taxonomy, and future directions., , , , and . Comput. Commun., (2017)