Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MUDirect: Protecting P2P IoT Devices with MUD., , , and . iThings/GreenCom/CPSCom/SmartData/Cybermatics, page 121-129. IEEE, (2021)CompactDFA: Generic State Machine Compression for Scalable Pattern Matching., , and . INFOCOM, page 659-667. IEEE, (2010)Power grid vulnerability to geographically correlated failures - Analysis and control implications., , , , and . INFOCOM, page 2634-2642. IEEE, (2014)Accelerating regular expression matching over compressed HTTP., , , , and . INFOCOM, page 540-548. IEEE, (2015)Leveraging traffic repetitions for high-speed deep packet inspection., , , and . INFOCOM, page 2578-2586. IEEE, (2015)Making DPI Engines Resilient to Algorithmic Complexity Attacks., , , , and . IEEE/ACM Trans. Netw., 24 (6): 3262-3275 (2016)Power Grid Vulnerability to Geographically Correlated Failures - Analysis and Control Implications, , , , and . CoRR, (2012)Crosstalk-preventing scheduling in single-and two-stage AWG-based cell switches., , and . IEEE/ACM Trans. Netw., 19 (1): 142-155 (2011)Optimal Resource Allocation for Disaster Recovery., , and . GLOBECOM, page 1-5. IEEE, (2010)FTvNF: fault tolerant virtual network functions., , and . ANCS, page 141-147. ACM, (2018)