|
Search the dblp DataBase
Minaxi Gupta:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Minaxi Gupta, Mostafa H. Ammar
Network Using Limited Branching Techniques. [Citation Graph (0, 0)][DBLP] International Conference on Internet Computing, 2002, pp:156-163 [Conf]
- Minaxi Gupta, Mani Subramanian
Preprocessor Algorithm for Network Management Codebook. [Citation Graph (0, 0)][DBLP] Workshop on Intrusion Detection and Network Monitoring, 1999, pp:93-102 [Conf]
- Andrew Kalafut, Abhinav Acharya, Minaxi Gupta
A study of malware in peer-to-peer networks. [Citation Graph (0, 0)][DBLP] Internet Measurement Conference, 2006, pp:327-332 [Conf]
- Minaxi Gupta, Mostafa H. Ammar
Service Differentiation in Peer-to-Peer Networks Utilizing Reputations. [Citation Graph (0, 0)][DBLP] Networked Group Communication, 2003, pp:70-82 [Conf]
- Minaxi Gupta, Paul Judge, Mostafa H. Ammar
A reputation system for peer-to-peer networks. [Citation Graph (0, 0)][DBLP] NOSSDAV, 2003, pp:144-152 [Conf]
- Ludmila Cherkasova, Minaxi Gupta
Characterizing locality, evolution, and life span of accesses in enterprise media server workloads. [Citation Graph (0, 0)][DBLP] NOSSDAV, 2002, pp:33-42 [Conf]
- Anne M. Faber, Minaxi Gupta, Camilo H. Viecco
Grid networks and portals - Revisiting web server workload invariants in the context of scientific web sites. [Citation Graph (0, 0)][DBLP] SC, 2006, pp:110- [Conf]
- Minaxi Gupta, Mostafa H. Ammar, Mustaque Ahamad
Trade-offs between reliability and overheads in peer-to-peer reputation tracking. [Citation Graph (0, 0)][DBLP] Computer Networks, 2006, v:50, n:4, pp:501-522 [Journal]
- Ludmila Cherkasova, Minaxi Gupta
Analysis of enterprise media server workloads: access patterns, locality, content evolution, and rates of change. [Citation Graph (0, 0)][DBLP] IEEE/ACM Trans. Netw., 2004, v:12, n:5, pp:781-794 [Journal]
A Case Study on Asprox Infection Dynamics. [Citation Graph (, )][DBLP]
Hiding in Plain Sight: Exploiting Broadcast for Practical Host Anonymity. [Citation Graph (, )][DBLP]
IPSec: Performance Analysis and Enhancements. [Citation Graph (, )][DBLP]
Pollution Resilience for DNS Resolvers. [Citation Graph (, )][DBLP]
Sensitive Data Requests: Do Sites Ask Correctly? [Citation Graph (, )][DBLP]
The web is smaller than it seems. [Citation Graph (, )][DBLP]
Understanding implications of DNS zone provisioning. [Citation Graph (, )][DBLP]
Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems. [Citation Graph (, )][DBLP]
PhishNet: Predictive Blacklisting to Detect Phishing Attacks. [Citation Graph (, )][DBLP]
Behind Phishing: An Examination of Phisher Modi Operandi. [Citation Graph (, )][DBLP]
Exploitable Redirects on the Web: Identification, Prevalence, and Defense. [Citation Graph (, )][DBLP]
A Unified Approach to Intra-domain Security. [Citation Graph (, )][DBLP]
Packet forwarding with source verification. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.004secs
|