Is this your profile?
Claim your Citation Index profile in order to display more information about you and gain access to Libraries services. Just create or connect your ORCID iD.
2021 article
Advanced Secure DNS Name Autoconfiguration with Authentication for Enterprise IoT Network
2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM).
2018 article
Furnace: Self-service Tenant VMI for the Cloud
RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2018, Vol. 11050, pp. 647–669.
2018 article
Hyperagents: Migrating Host Agents to the Hypervisor
PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), pp. 212–223.
2017 chapter
Computer-Aided Human Centric Cyber Situation Awareness
In Theory and Models for Cyber Situation Awareness (pp. 3–25).
2017 journal article
Goalkeeper: Comprehensive process enforcement from the hypervisor
COMPUTERS & SECURITY, 73, 459–473.
2017 journal article
T-Chain: A General Incentive Scheme for Cooperative Computing
IEEE-ACM TRANSACTIONS ON NETWORKING, 25(4), 2122–2137.
2013 journal article
Deriving common malware behavior through graph clustering
COMPUTERS & SECURITY, 39, 419–430.
2012 conference paper
AntiLiar: Defending against cheating attacks in mesh based streaming
2012 IEEE 12th international conference on peer-to-peer computing (p2p), 115–125.
2012 journal article
Interval-based flow watermarking for tracing interactive traffic
COMPUTER NETWORKS, 56(5), 1646–1665.
2011 chapter
Defending against Sybil Nodes in BitTorrent
In NETWORKING 2011 (pp. 25–39).
2011 journal article
Winnowing: Protecting P2P systems against pollution through cooperative index filtering
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 35(1), 72–84.
2010 chapter
How the Public Views Strategies Designed to Reduce the Threat of Botnets
In Trust and Trustworthy Computing (pp. 337–351).
2010 journal article
Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 8(3), 434–449.
2009 journal article
Edge-Reconfigurable Optical Networks (ERONs): Rationale, Network Design, and Evaluation
Journal of Lightwave Technology, 27(12), 1837–1845.
Contributors: L. Battestilli n , G. Karmous-Edwards n, n, G. Rouskas n , P. Vegesna n & A. Vishwanath n
2009 conference paper
Identification of bot commands by run-time execution monitoring
25th Annual Computer Security Applications Conference, 321–330.
2005 chapter
Network Access Control for Mobile Ad-Hoc Networks
In Information and Communications Security (pp. 350–362).
2005 journal article
Network access control for mobile ad-hoc networks
Information and Communications Security, 3783, 350–362.
2004 journal article
Bandwidth provisioning and pricing for networks with multiple classes of service
COMPUTER NETWORKS, 46(1), 41–52.
2004 journal article
Capacity planning of DiffServ networks with best-effort and Expedited Forwarding traffic
TELECOMMUNICATION SYSTEMS, 25(3-4), 193–207.
2004 chapter
Certificate recommendations to improve the robustness of web of trust
In K. Zhang & Y. Zheng (Eds.), Information security: 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004: Proceedings (Vol. 3225, pp. 292–303).
Ed(s): . K. Zhang & Y. Zheng
2004 chapter
Improving robustness of PGP keyrings by conflict detection
In Topics in cryptology, CT-RSA 2004 (Vol. 2964, pp. 194–207).
2004 chapter
Storage-efficient stateless group key revocation
In K. Zhang & Y. Zheng (Eds.), Information security: 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004: Proceedings (Vol. 3225, pp. 25–38).
Ed(s): . K. Zhang & Y. Zheng
2002 chapter
Analyzing intensive intrusion alerts via correlation
In G. V. A. Wespi & L. Deri (Eds.), Recent advances in intrusion detection, 5th international symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002: Proceedings (Vol. 2516, pp. 74–94).
Ed(s): G. A. Wespi & L. Deri
2002 conference paper
Inter-packet delay based correlation for tracing encrypted connections through stepping stones
In G. K. D. Gollmann & M. Waidner (Eds.), Computer security--ESORICS 2002: 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002: proceedings (Lecture notes in computer science ; 2502) (Vol. 2502, pp. 244–263). New York: Springer.
Ed(s): G. D. Gollmann & M. Waidner
2002 chapter
The economic impact of network pricing intervals
In Burkhard Stiller ...[et al.] (Eds.), From QoS provisioning to QoS charging: Third COST 263 International Workshop on Quality of Future Internet Services, QofIS 2002 and second International Workshop on Internet Charging and QoS Technologies, ICQT 2002, Zurich, Switzerland, October 16-18, 2002 (Vol. 2511, pp. 315–324).
2001 chapter
Optimal provisioning and pricing of Internet differentiated services in hierarchical markets
In Networking-ICN 2001: First international conference, Colmar, France, July 9-13, 2001: Proceedings (Vol. 2093, pp. 409–418).
2000 journal article
A distributed algorithm for delay-constrained unicast routing
IEEE-ACM TRANSACTIONS ON NETWORKING, 8(2), 239–250.
2000 article
Parallel image processing with the block data parallel architecture (Reprinted from Proceedings of the IEEE, vol 84, pg 947-968, 1996)
Alexander, W. E., Reeves, D. S., & Gloster, C. S. (2000, September). IBM JOURNAL OF RESEARCH AND DEVELOPMENT, Vol. 44, pp. 681–702.
2000 chapter
QoS rewards and risks: A multi-market approach to resource allocation
In Networking 2000: Broadband communications, high performance networking, and performance of communication networks / IFIP-TC6/European Commission International Conference, Paris, France, May 2000, proceedings (Vol. 1815, pp. 945–956).
1999 journal article
A survey of statistical source models for variable-bit-rate compressed video
MULTIMEDIA SYSTEMS, 7(3), 199–213.
1997 journal article
Evaluation of multicast routing algorithms for real-time communication on high-speed networks
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 15(3), 332–345.
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.