Name
Papers
Collaborators
ANAT BREMLER-BARR
59
60
Citations 
PageRank 
Referers 
505
39.95
1171
Referees 
References 
1153
811
Search Limit
1001000
Title
Citations
PageRank
Year
Demo - NFV-based IoT Security at the ISP Level.00.342020
NFV-based IoT Security for Home Networks using MUD10.372020
Zero-Day Signature Extraction for High-Volume Attacks00.342019
DNS Negative Caching in the Wild.00.342019
Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications.40.402018
Detecting Heavy Flows in the SDN Match and Action Model.90.512018
Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters sketches.00.342017
Making DPI Engines Resilient to Algorithmic Complexity Attacks.10.382016
Scalable URL matching with small memory footprint00.342016
Efficient Distinct Heavy Hitters for DNS DDoS Attack Detection.00.342016
OpenBox: A Software-Defined Framework for Developing, Deploying, and Managing Network Functions.501.472016
Efficient Round-Trip Time Monitoring In Openflow Networks20.382016
OpenBox: Enabling Innovation in Middlebox Applications110.602015
Sampling and Large Flow Detection in SDN40.432015
Ultra-Fast Similarity Search Using Ternary Content Addressable Memory50.392015
Yo-Yo Attack: Vulnerability In Auto-scaling Mechanism20.372015
Leveraging Traffic Repetitions For High-Speed Deep Packet Inspection70.462015
Accelerating regular expression matching over compressed HTTP40.402015
Orange: multi field openflow based range classifier50.562015
CompactDFA: Scalable Pattern Matching Using Longest Prefix Match Solutions100.492014
Ranges and cross-entrance consistency with OpenFlow10.372014
Computer and network performance: Graduating from the "Age of Innocence".10.402014
Deep Packet Inspection as a Service.331.562014
Cross-Entrance Consistent Range Classifier with OpenFlow.20.392014
Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks130.652013
Automated signature extraction for high volume attacks30.402013
On the exploitation of CDF based wireless scheduling120.842013
Recursive design of hardware priority queues20.382013
Space efficient deep packet inspection of compressed web traffic30.412012
Decompression-free inspection: DPI for shared dictionary compression over HTTP80.492012
On the vulnerability of hardware hash tables to sophisticated attacks90.582012
MCA2: multi-core architecture for mitigating complexity attacks10.362012
Layered interval codes for TCAM-based classification160.792012
Shift-based pattern matching for compressed web traffic.30.412011
On the vulnerability of the proportional fairness scheduler to retransmission attacks70.552011
Network and computer performance in malicious environments: The good, the bad and the ugly.00.342011
Controlling P2P Applications via Address Harvesting: The Skype Story10.402011
On the stability of skype super nodes00.342011
Efficient processing of multi-connection compressed web traffic20.382011
Space-time tradeoffs in software-based deep Packet Inspection100.662011
On the Dynamics of IP Address Allocation and Availability of End-Hosts00.342010
PEDS: a parallel error detection scheme for TCAM devices30.392010
CompactDFA: Generic State Machine Compression for Scalable Pattern Matching251.052010
Bringing order to BGP: Decreasing time and message complexity50.442009
Accelerating Multipattern Matching on Compressed HTTP Traffic140.622009
Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks90.562008
Protecting Bursty Applications Against Traffic Aggressiveness00.342007
Spoofing prevention method612.532005
Path layout on tree networks: bounds in different label switching models00.342004
Improved BGP convergence via ghost flushing512.662004
  • 1
  • 2