Author of the publication

A light-weight distributed scheme for detecting ip prefix hijacks in real-time.

, , , , and . SIGCOMM, page 277-288. ACM, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

G-RCA: a generic root cause analysis platform for service quality management in large IP networks., , , , , and . IEEE/ACM Trans. Netw., 20 (6): 1734-1747 (2012)Wresting Control from BGP: Scalable Fine-Grained Route Control., , , , , and . USENIX Annual Technical Conference, page 295-308. USENIX, (2007)Learning thresholds for PV change detection from operators' labels., , , , , , , , and . IPCCC, page 1-9. IEEE Computer Society, (2015)TowerDefense: Deployment strategies for battling against IP prefix hijacking., , , , and . ICNP, page 134-143. IEEE Computer Society, (2010)FOCUS: Shedding light on the high search response time in the wild., , , , , , , and . INFOCOM, page 1-9. IEEE, (2016)PHAS: A Prefix Hijack Alert System., , , , , and . USENIX Security Symposium, USENIX Association, (2006)AdCell: Ad Allocation in Cellular Networks., , , , and . ESA, volume 6942 of Lecture Notes in Computer Science, page 311-322. Springer, (2011)Scalable VPN routing via relaying., , , , and . SIGMETRICS, page 61-72. ACM, (2008)Robust and Unsupervised KPI Anomaly Detection Based on Conditional Variational Autoencoder., , and . IPCCC, page 1-9. IEEE, (2018)Rapid Deployment of Anomaly Detection Models for Large Number of Emerging KPI Streams., , , , , , and . IPCCC, page 1-8. IEEE, (2018)