Author of the publication

DPX: Data-Plane eXtensions for SDN Security Service Instantiation.

, , , , , , and . DIMVA, volume 11543 of Lecture Notes in Computer Science, page 415-437. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Global Intrusion Detection in the DOMINO Overlay System., , and . NDSS, The Internet Society, (2004)Improving NIDS Performance Through Hardware-based Connection Filtering., , and . ICC, page 2183-2188. IEEE, (2006)A framework for malicious workload generation., , and . Internet Measurement Conference, page 82-87. ACM, (2004)Bridging the architectural gap between NOS design principles in software-defined networks., , , , , and . SoCC, page 637. ACM, (2017)Eureka: A Framework for Enabling Static Malware Analysis., , , , and . ESORICS, volume 5283 of Lecture Notes in Computer Science, page 481-500. Springer, (2008)A comparative assessment of malware classification using binary texture analysis and dynamic analysis., , , and . AISec, page 21-30. ACM, (2011)Securing Ultra-High-Bandwidth Science DMZ Networks with Coordinated Situational Awareness., , and . HotNets, page 22-28. ACM, (2017)Coordinated dataflow protection for ultra-high bandwidth science networks., , , and . ACSAC, page 568-583. ACM, (2019)Automated Categorization of Onion Sites for Analyzing the Darkweb Ecosystem., , , , and . KDD, page 1793-1802. ACM, (2017)BLADE: Slashing the Invisible Channel of Drive-by Download Malware., , , and . RAID, volume 5758 of Lecture Notes in Computer Science, page 350-352. Springer, (2009)