Ahmed Khurshid

According to our database1, Ahmed Khurshid authored at least 8 papers between 2011 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Modified TCP NewReno for wireless networks.
Proceedings of the International Conference on Networking Systems and Security, 2015

2013
VeriFlow: Verifying Network-Wide Invariants in Real Time.
Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, 2013

2012
Veriflow: verifying network-wide invariants in real time.
Comput. Commun. Rev., 2012

2011
Debugging the data plane with anteater.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Making DTNs robust against spoofing attacks with localized countermeasures.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

Scaling data-plane logging in large scale networks.
Proceedings of the MILCOM 2011, 2011

Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Improving robustness of DNS to software vulnerabilities.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011


  Loading...