The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Minaxi Gupta: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Minaxi Gupta, Mostafa H. Ammar
    Network Using Limited Branching Techniques. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2002, pp:156-163 [Conf]
  2. Minaxi Gupta, Mani Subramanian
    Preprocessor Algorithm for Network Management Codebook. [Citation Graph (0, 0)][DBLP]
    Workshop on Intrusion Detection and Network Monitoring, 1999, pp:93-102 [Conf]
  3. Andrew Kalafut, Abhinav Acharya, Minaxi Gupta
    A study of malware in peer-to-peer networks. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Conference, 2006, pp:327-332 [Conf]
  4. Minaxi Gupta, Mostafa H. Ammar
    Service Differentiation in Peer-to-Peer Networks Utilizing Reputations. [Citation Graph (0, 0)][DBLP]
    Networked Group Communication, 2003, pp:70-82 [Conf]
  5. Minaxi Gupta, Paul Judge, Mostafa H. Ammar
    A reputation system for peer-to-peer networks. [Citation Graph (0, 0)][DBLP]
    NOSSDAV, 2003, pp:144-152 [Conf]
  6. Ludmila Cherkasova, Minaxi Gupta
    Characterizing locality, evolution, and life span of accesses in enterprise media server workloads. [Citation Graph (0, 0)][DBLP]
    NOSSDAV, 2002, pp:33-42 [Conf]
  7. Anne M. Faber, Minaxi Gupta, Camilo H. Viecco
    Grid networks and portals - Revisiting web server workload invariants in the context of scientific web sites. [Citation Graph (0, 0)][DBLP]
    SC, 2006, pp:110- [Conf]
  8. Minaxi Gupta, Mostafa H. Ammar, Mustaque Ahamad
    Trade-offs between reliability and overheads in peer-to-peer reputation tracking. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2006, v:50, n:4, pp:501-522 [Journal]
  9. Ludmila Cherkasova, Minaxi Gupta
    Analysis of enterprise media server workloads: access patterns, locality, content evolution, and rates of change. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2004, v:12, n:5, pp:781-794 [Journal]

  10. A Case Study on Asprox Infection Dynamics. [Citation Graph (, )][DBLP]


  11. Hiding in Plain Sight: Exploiting Broadcast for Practical Host Anonymity. [Citation Graph (, )][DBLP]


  12. IPSec: Performance Analysis and Enhancements. [Citation Graph (, )][DBLP]


  13. Pollution Resilience for DNS Resolvers. [Citation Graph (, )][DBLP]


  14. Sensitive Data Requests: Do Sites Ask Correctly? [Citation Graph (, )][DBLP]


  15. The web is smaller than it seems. [Citation Graph (, )][DBLP]


  16. Understanding implications of DNS zone provisioning. [Citation Graph (, )][DBLP]


  17. Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems. [Citation Graph (, )][DBLP]


  18. PhishNet: Predictive Blacklisting to Detect Phishing Attacks. [Citation Graph (, )][DBLP]


  19. Behind Phishing: An Examination of Phisher Modi Operandi. [Citation Graph (, )][DBLP]


  20. Exploitable Redirects on the Web: Identification, Prevalence, and Defense. [Citation Graph (, )][DBLP]


  21. A Unified Approach to Intra-domain Security. [Citation Graph (, )][DBLP]


  22. Packet forwarding with source verification. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002