Demo - NFV-based IoT Security at the ISP Level. | 0 | 0.34 | 2020 |
NFV-based IoT Security for Home Networks using MUD | 1 | 0.37 | 2020 |
Zero-Day Signature Extraction for High-Volume Attacks | 0 | 0.34 | 2019 |
DNS Negative Caching in the Wild. | 0 | 0.34 | 2019 |
Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications. | 4 | 0.40 | 2018 |
Detecting Heavy Flows in the SDN Match and Action Model. | 9 | 0.51 | 2018 |
Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters sketches. | 0 | 0.34 | 2017 |
Making DPI Engines Resilient to Algorithmic Complexity Attacks. | 1 | 0.38 | 2016 |
Scalable URL matching with small memory footprint | 0 | 0.34 | 2016 |
Efficient Distinct Heavy Hitters for DNS DDoS Attack Detection. | 0 | 0.34 | 2016 |
OpenBox: A Software-Defined Framework for Developing, Deploying, and Managing Network Functions. | 50 | 1.47 | 2016 |
Efficient Round-Trip Time Monitoring In Openflow Networks | 2 | 0.38 | 2016 |
OpenBox: Enabling Innovation in Middlebox Applications | 11 | 0.60 | 2015 |
Sampling and Large Flow Detection in SDN | 4 | 0.43 | 2015 |
Ultra-Fast Similarity Search Using Ternary Content Addressable Memory | 5 | 0.39 | 2015 |
Yo-Yo Attack: Vulnerability In Auto-scaling Mechanism | 2 | 0.37 | 2015 |
Leveraging Traffic Repetitions For High-Speed Deep Packet Inspection | 7 | 0.46 | 2015 |
Accelerating regular expression matching over compressed HTTP | 4 | 0.40 | 2015 |
Orange: multi field openflow based range classifier | 5 | 0.56 | 2015 |
CompactDFA: Scalable Pattern Matching Using Longest Prefix Match Solutions | 10 | 0.49 | 2014 |
Ranges and cross-entrance consistency with OpenFlow | 1 | 0.37 | 2014 |
Computer and network performance: Graduating from the "Age of Innocence". | 1 | 0.40 | 2014 |
Deep Packet Inspection as a Service. | 33 | 1.56 | 2014 |
Cross-Entrance Consistent Range Classifier with OpenFlow. | 2 | 0.39 | 2014 |
Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks | 13 | 0.65 | 2013 |
Automated signature extraction for high volume attacks | 3 | 0.40 | 2013 |
On the exploitation of CDF based wireless scheduling | 12 | 0.84 | 2013 |
Recursive design of hardware priority queues | 2 | 0.38 | 2013 |
Space efficient deep packet inspection of compressed web traffic | 3 | 0.41 | 2012 |
Decompression-free inspection: DPI for shared dictionary compression over HTTP | 8 | 0.49 | 2012 |
On the vulnerability of hardware hash tables to sophisticated attacks | 9 | 0.58 | 2012 |
MCA2: multi-core architecture for mitigating complexity attacks | 1 | 0.36 | 2012 |
Layered interval codes for TCAM-based classification | 16 | 0.79 | 2012 |
Shift-based pattern matching for compressed web traffic. | 3 | 0.41 | 2011 |
On the vulnerability of the proportional fairness scheduler to retransmission attacks | 7 | 0.55 | 2011 |
Network and computer performance in malicious environments: The good, the bad and the ugly. | 0 | 0.34 | 2011 |
Controlling P2P Applications via Address Harvesting: The Skype Story | 1 | 0.40 | 2011 |
On the stability of skype super nodes | 0 | 0.34 | 2011 |
Efficient processing of multi-connection compressed web traffic | 2 | 0.38 | 2011 |
Space-time tradeoffs in software-based deep Packet Inspection | 10 | 0.66 | 2011 |
On the Dynamics of IP Address Allocation and Availability of End-Hosts | 0 | 0.34 | 2010 |
PEDS: a parallel error detection scheme for TCAM devices | 3 | 0.39 | 2010 |
CompactDFA: Generic State Machine Compression for Scalable Pattern Matching | 25 | 1.05 | 2010 |
Bringing order to BGP: Decreasing time and message complexity | 5 | 0.44 | 2009 |
Accelerating Multipattern Matching on Compressed HTTP Traffic | 14 | 0.62 | 2009 |
Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks | 9 | 0.56 | 2008 |
Protecting Bursty Applications Against Traffic Aggressiveness | 0 | 0.34 | 2007 |
Spoofing prevention method | 61 | 2.53 | 2005 |
Path layout on tree networks: bounds in different label switching models | 0 | 0.34 | 2004 |
Improved BGP convergence via ghost flushing | 51 | 2.66 | 2004 |