Follow
Ehud (Udi) Ben-porat
Ehud (Udi) Ben-porat
Unknown affiliation
No verified email
Title
Cited by
Cited by
Year
Vulnerability of network mechanisms to sophisticated DDoS attacks
U Ben-Porat, A Bremler-Barr, H Levy
IEEE Transactions on Computers 62 (5), 1031-1043, 2012
552012
Evaluating the vulnerability of network mechanisms to sophisticated DDoS attacks
U Ben-Porat, A Bremler-Barr, H Levy
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 2297-2305, 2008
282008
On the vulnerability of hardware hash tables to sophisticated attacks
U Ben-Porat, A Bremler-Barr, H Levy, B Plattner
NETWORKING 2012: 11th International IFIP TC 6 Networking Conference, Prague …, 2012
242012
On the exploitation of CDF based wireless scheduling
U Ben-Porat, A Bremler-Barr, H Levy
IEEE INFOCOM 2009, 2821-2825, 2009
202009
On the vulnerability of the proportional fairness scheduler to retransmission attacks
U Ben-Porat, A Bremler-Barr, H Levy, B Plattner
2011 Proceedings IEEE INFOCOM, 1431-1439, 2011
152011
Computer and network performance: graduating from the “age of innocence”
U Ben-Porat, A Bremler-Barr, H Levy
Computer Networks 66, 68-81, 2014
72014
On the exploitation of CDF based wireless scheduling
U Ben-Porat, A Bremler-Barr, H Levy
Computer Networks 57 (10), 2193-2205, 2013
12013
2013 Index IEEE Transactions on Computers Vol. 62
S Abdi, O Aciicmez, J Adikari, JS Ahn, F Angiolini, M Annavaram, ...
IEEE Transactions on Computers 63 (1), 1, 2014
2014
Network and computer performance in malicious environments: The good, the bad and the ugly
U Ben-Porat, A Bremler-Barr, H Levy
International Conference on NETwork Games, Control and Optimization …, 2011
2011
The system can't perform the operation now. Try again later.
Articles 1–9