Is this your profile?
Claim your Citation Index profile in order to display more information about you and gain access to Libraries services. Just create or connect your ORCID iD.
2021 article
Advanced Secure DNS Name Autoconfiguration with Authentication for Enterprise IoT Network
2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM).
2018 article
Furnace: Self-service Tenant VMI for the Cloud
RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2018, Vol. 11050, pp. 647β669.
2018 journal article
Goalkeeper: Comprehensive process enforcement from the hypervisor
COMPUTERS & SECURITY, 73, 459β473.
2018 article
Hyperagents: Migrating Host Agents to the Hypervisor
PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), pp. 212β223.
2017 chapter
Computer-Aided Human Centric Cyber Situation Awareness
In Theory and Models for Cyber Situation Awareness (pp. 3β25).
2017 journal article
T-Chain: A General Incentive Scheme for Cooperative Computing
IEEE-ACM TRANSACTIONS ON NETWORKING, 25(4), 2122β2137.
2013 journal article
Deriving common malware behavior through graph clustering
COMPUTERS & SECURITY, 39, 419β430.
2012 conference paper
AntiLiar: Defending against cheating attacks in mesh based streaming
2012 IEEE 12th international conference on peer-to-peer computing (p2p), 115β125.
2012 journal article
Interval-based flow watermarking for tracing interactive traffic
COMPUTER NETWORKS, 56(5), 1646β1665.
2012 journal article
Winnowing: Protecting P2P systems against pollution through cooperative index filtering
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 35(1), 72β84.
2011 chapter
Defending against Sybil Nodes in BitTorrent
In NETWORKING 2011 (pp. 25β39).
2011 journal article
Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 8(3), 434β449.
2010 chapter
How the Public Views Strategies Designed to Reduce the Threat of Botnets
In Trust and Trustworthy Computing (pp. 337β351).
2009 journal article
Edge-Reconfigurable Optical Networks (ERONs): Rationale, Network Design, and Evaluation
Journal of Lightwave Technology, 27(12), 1837β1845.
Contributors: L. Battestilli nβ, G. Karmous-Edwards n, n, G. Rouskas nβ, P. Vegesna n & A. Vishwanath n
2009 conference paper
Identification of bot commands by run-time execution monitoring
25th Annual Computer Security Applications Conference, 321β330.
2005 chapter
Network Access Control for Mobile Ad-Hoc Networks
In Information and Communications Security (pp. 350β362).
2005 journal article
Network access control for mobile ad-hoc networks
Information and Communications Security, 3783, 350β362.
2004 journal article
Bandwidth provisioning and pricing for networks with multiple classes of service
COMPUTER NETWORKS, 46(1), 41β52.
2004 journal article
Capacity planning of DiffServ networks with best-effort and Expedited Forwarding traffic
TELECOMMUNICATION SYSTEMS, 25(3-4), 193β207.
2004 chapter
Certificate recommendations to improve the robustness of web of trust
In K. Zhang & Y. Zheng (Eds.), Information security: 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004: Proceedings (Vol. 3225, pp. 292β303).
Ed(s): . K. Zhang & Y. Zheng
2004 chapter
Improving robustness of PGP keyrings by conflict detection
In Topics in cryptology, CT-RSA 2004 (Vol. 2964, pp. 194β207).
2004 chapter
Storage-efficient stateless group key revocation
In K. Zhang & Y. Zheng (Eds.), Information security: 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004: Proceedings (Vol. 3225, pp. 25β38).
Ed(s): . K. Zhang & Y. Zheng
2002 chapter
Analyzing intensive intrusion alerts via correlation
In G. V. A. Wespi & L. Deri (Eds.), Recent advances in intrusion detection, 5th international symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002: Proceedings (Vol. 2516, pp. 74β94).
Ed(s): G. A. Wespi & L. Deri
2002 conference paper
Inter-packet delay based correlation for tracing encrypted connections through stepping stones
In G. K. D. Gollmann & M. Waidner (Eds.), Computer security--ESORICS 2002: 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002: proceedings (Lecture notes in computer science ; 2502) (Vol. 2502, pp. 244β263). New York: Springer.
Ed(s): G. D. Gollmann & M. Waidner
2002 chapter
The economic impact of network pricing intervals
In Burkhard Stiller ...[et al.] (Eds.), From QoS provisioning to QoS charging: Third COST 263 International Workshop on Quality of Future Internet Services, QofIS 2002 and second International Workshop on Internet Charging and QoS Technologies, ICQT 2002, Zurich, Switzerland, October 16-18, 2002 (Vol. 2511, pp. 315β324).
2001 chapter
Optimal provisioning and pricing of Internet differentiated services in hierarchical markets
In Networking-ICN 2001: First international conference, Colmar, France, July 9-13, 2001: Proceedings (Vol. 2093, pp. 409β418).
2000 journal article
A distributed algorithm for delay-constrained unicast routing
IEEE-ACM TRANSACTIONS ON NETWORKING, 8(2), 239β250.
2000 article
Parallel image processing with the block data parallel architecture (Reprinted from Proceedings of the IEEE, vol 84, pg 947-968, 1996)
Alexander, W. E., Reeves, D. S., & Gloster, C. S. (2000, September). IBM JOURNAL OF RESEARCH AND DEVELOPMENT, Vol. 44, pp. 681β702.
2000 chapter
QoS rewards and risks: A multi-market approach to resource allocation
In Networking 2000: Broadband communications, high performance networking, and performance of communication networks / IFIP-TC6/European Commission International Conference, Paris, France, May 2000, proceedings (Vol. 1815, pp. 945β956).
1999 journal article
A survey of statistical source models for variable-bit-rate compressed video
MULTIMEDIA SYSTEMS, 7(3), 199β213.
1997 journal article
Evaluation of multicast routing algorithms for real-time communication on high-speed networks
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 15(3), 332β345.