Udi Ben-Porat

According to our database1, Udi Ben-Porat authored at least 7 papers between 2008 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Computer and network performance: Graduating from the "Age of Innocence".
Comput. Networks, 2014

2013
Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks.
IEEE Trans. Computers, 2013

On the exploitation of CDF based wireless scheduling.
Comput. Networks, 2013

2012
On the Vulnerability of Hardware Hash Tables to Sophisticated Attacks.
Proceedings of the NETWORKING 2012, 2012

2011
Network and computer performance in malicious environments: The good, the bad and the ugly.
Proceedings of the 5th International Conference on NETwork Games, COntrol and OPtimization, 2011

On the vulnerability of the proportional fairness scheduler to retransmission attacks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2008
Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008


  Loading...