|
Search the dblp DataBase
Mina Guirguis:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Mina Guirguis, Azer Bestavros, Ibrahim Matta
Exploiting the Transients of Adaptation for RoQ Attacks on Internet Resources. [Citation Graph (0, 0)][DBLP] ICNP, 2004, pp:184-195 [Conf]
- Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuting Zhang
Reduction of quality (RoQ) attacks on Internet end-systems. [Citation Graph (0, 0)][DBLP] INFOCOM, 2005, pp:1362-1372 [Conf]
- Mina Guirguis, Azer Bestavros, Ibrahim Matta, N. Riga, G. Diamant, Yuting Zhang
Providing soft bandwidth guarantees using elastic TCP-based tunnels. [Citation Graph (0, 0)][DBLP] ISCC, 2004, pp:760-765 [Conf]
- Yuting Zhang, Azer Bestavros, Mina Guirguis, Ibrahim Matta, Richard West
Friendly virtual machines: leveraging a feedback-control model for application adaptation. [Citation Graph (0, 0)][DBLP] VEE, 2005, pp:2-12 [Conf]
- Mina Guirguis, Azer Bestavros, Ibrahim Matta
Exogenous-loss aware traffic management in overlay networks: Toward global fairness. [Citation Graph (0, 0)][DBLP] Computer Networks, 2006, v:50, n:13, pp:2331-2348 [Journal]
- Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuting Zhang
Adversarial exploits of end-systems adaptation dynamics. [Citation Graph (0, 0)][DBLP] J. Parallel Distrib. Comput., 2007, v:67, n:3, pp:318-335 [Journal]
- Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuting Zhang
Reduction of Quality (RoQ) Attacks on Dynamic Load Balancers: Vulnerability Assessment and Design Tradeoffs. [Citation Graph (0, 0)][DBLP] INFOCOM, 2007, pp:857-865 [Conf]
An SSVEP based BCI System for a Wheelchair Control. [Citation Graph (, )][DBLP]
BEXPLORER: Computer and Communication Control Using EEG. [Citation Graph (, )][DBLP]
HELP: // Hypertext In-Emergency Leveraging Protocol. [Citation Graph (, )][DBLP]
Liberating TCP: The Free and the Stunts. [Citation Graph (, )][DBLP]
Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks. [Citation Graph (, )][DBLP]
Stealthy IP Prefix Hijacking: Don't Bite Off More Than You Can Chew. [Citation Graph (, )][DBLP]
On the Safety and Security of Path Splicing: A Case Study for Path Splicing on the GEANT Network. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|