Author of the publication

InFilter: Predictive Ingress Filtering to Detect Spoofed IP Traffic.

, , , and . ICDCS Workshops, page 99-106. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Runtime Attestation for IAAS Clouds., , , , , , and . CLOSER, page 233-247. SciTePress, (2018)Last hop topology sensitive multicasting key managment., and . Q2SWinet, page 63-70. ACM, (2005)InFilter: Predictive Ingress Filtering to Detect Spoofed IP Traffic., , , and . ICDCS Workshops, page 99-106. IEEE Computer Society, (2005)Predicting End-to-end Network Load., , , , and . ICMLA, page 917-920. IEEE Computer Society, (2010)Designing Multiprocessor/Distributed Real-Time Systems Using the ASSERTS Toolkit., , , , , , and . Euro-Par, volume 1685 of Lecture Notes in Computer Science, page 505-510. Springer, (1999)Computing with time: microarchitectural weird machines., , , , , and . ASPLOS, page 758-772. ACM, (2021)An Approach to Secure Localization in WLANs., , and . WCNC, page 3145-3150. IEEE, (2008)Hybrid testbeds for QoS management in opaque MANETS., , , and . WICON, page 72. ICST, (2008)QAM: A comprehensive QoS-aware Middleware suite for tactical communications., , , , , , , and . MILCOM, page 1586-1591. IEEE, (2011)Towards a Theory of Intrusion Detection., , and . ESORICS, volume 3679 of Lecture Notes in Computer Science, page 267-286. Springer, (2005)