Cited By
View all- Nance-Hall MLiu ZSekar VDurairajan R(2025)Analyzing the Benefits of Optical Topology Programming for Mitigating Link-Flood DDoS AttacksIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.339118822:1(146-163)Online publication date: Jan-2025
- Wang JZhao GXu HQiao CHuang H(2025)A cost-efficient traffic engineering framework with various pricing schemes in cloudsComputer Networks10.1016/j.comnet.2025.111090259(111090)Online publication date: Mar-2025
- Namyar PArzani BBeckett RSegarra SRaj HKrishnaswamy UGovindan RKandula SVanbever LZhang I(2024)Finding adversarial inputs for heuristics using multi-level optimizationProceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation10.5555/3691825.3691877(927-949)Online publication date: 16-Apr-2024
- Show More Cited By

