Author of the publication

HEX Switch: Hardware-assisted security extensions of OpenFlow.

, , and . SecSoN@SIGCOMM, page 33-39. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PRIDE: Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks., , , , and . ICICS, volume 8233 of Lecture Notes in Computer Science, page 213-228. Springer, (2013)CloudRand: Building Heterogeneous and Moving-Target Network Interfaces., , , and . ICCCN, page 1-11. IEEE, (2018)PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks., , , and . RAID, volume 7462 of Lecture Notes in Computer Science, page 230-253. Springer, (2012)EFFORT: A new host-network cooperated framework for efficient and effective bot malware detection., , and . Computer Networks, 57 (13): 2628-2642 (2013)PeerPress: utilizing enemies' P2P strength against them., , , and . ACM Conference on Computer and Communications Security, page 581-592. ACM, (2012)CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers., , , , and . NDSS, The Internet Society, (2014)PRIDE: A practical intrusion detection system for resource constrained wireless mesh networks., , , , and . Computers & Security, (2016)HEX Switch: Hardware-assisted security extensions of OpenFlow., , and . SecSoN@SIGCOMM, page 33-39. ACM, (2018)Automatic generation of vaccines for malware immunization., , , and . ACM Conference on Computer and Communications Security, page 1037-1039. ACM, (2012)DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications., , , , and . ESORICS (1), volume 8712 of Lecture Notes in Computer Science, page 163-182. Springer, (2014)