Vulnerability of network mechanisms to sophisticated DDoS attacks U Ben-Porat, A Bremler-Barr, H Levy IEEE Transactions on Computers 62 (5), 1031-1043, 2012 | 48 | 2012 |
Evaluating the vulnerability of network mechanisms to sophisticated DDoS attacks U Ben-Porat, A Bremler-Barr, H Levy IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 2297-2305, 2008 | 29 | 2008 |
On the vulnerability of hardware hash tables to sophisticated attacks U Ben-Porat, A Bremler-Barr, H Levy, B Plattner NETWORKING 2012: 11th International IFIP TC 6 Networking Conference, Prague …, 2012 | 24 | 2012 |
On the exploitation of CDF based wireless scheduling U Ben-Porat, A Bremler-Barr, H Levy IEEE INFOCOM 2009, 2821-2825, 2009 | 20 | 2009 |
On the vulnerability of the proportional fairness scheduler to retransmission attacks U Ben-Porat, A Bremler-Barr, H Levy, B Plattner 2011 Proceedings IEEE INFOCOM, 1431-1439, 2011 | 15 | 2011 |
Computer and network performance: graduating from the “age of innocence” U Ben-Porat, A Bremler-Barr, H Levy Computer Networks 66, 68-81, 2014 | 4 | 2014 |
On the exploitation of CDF based wireless scheduling U Ben-Porat, A Bremler-Barr, H Levy Computer Networks 57 (10), 2193-2205, 2013 | 1 | 2013 |
2013 Index IEEE Transactions on Computers Vol. 62 S Abdi, O Aciicmez, J Adikari, JS Ahn, F Angiolini, M Annavaram, ... IEEE Transactions on Computers 63 (1), 1, 2014 | | 2014 |
Network and computer performance in malicious environments: The good, the bad and the ugly U Ben-Porat, A Bremler-Barr, H Levy International Conference on NETwork Games, Control and Optimization …, 2011 | | 2011 |