Author of the publication

Dynamics of Prefix Usage at an Edge Router.

, , and . PAM, volume 6579 of Lecture Notes in Computer Science, page 11-20. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ICDAR2015 competition on recognition of documents with complex layouts - RDCL2015., , , and . ICDAR, page 1151-1155. IEEE Computer Society, (2015)relocated from Tunis, Tunisia.Epiphany: A location hiding architecture for protecting critical services from DDoS attacks., , and . DSN, page 1-12. IEEE Computer Society, (2012)A framework for classifying denial of service attacks., , and . SIGCOMM, page 99-110. ACM, (2003)Towards characterizing international routing detours., , and . AINTEC, page 17-24. ACM, (2016)SCARI: A Strategic Caching and Reservation Protocol for ICN., , and . AINTEC, page 1-8. ACM, (2018)Managing scientific data with named data networking., , , , , and . NDM@SC, page 1:1-1:7. ACM, (2015)CyberSeer: 3D audio-visual immersion for network security and management., , , and . VizSEC, page 90-98. ACM, (2004)Incremental Deployment Strategies for Effective Detection and Prevention of BGP Origin Hijacks., , and . ICDCS, page 670-679. IEEE Computer Society, (2014)Taming the 800 Pound Gorilla: The Rise and Decline of NTP DDoS Attacks., , , , , and . Internet Measurement Conference, page 435-448. ACM, (2014)A comparison of application-level and router-assisted hierarchical schemes for reliable multicast., , , and . IEEE/ACM Trans. Netw., 12 (3): 469-482 (2004)