The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Mina Guirguis: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mina Guirguis, Azer Bestavros, Ibrahim Matta
    Exploiting the Transients of Adaptation for RoQ Attacks on Internet Resources. [Citation Graph (0, 0)][DBLP]
    ICNP, 2004, pp:184-195 [Conf]
  2. Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuting Zhang
    Reduction of quality (RoQ) attacks on Internet end-systems. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:1362-1372 [Conf]
  3. Mina Guirguis, Azer Bestavros, Ibrahim Matta, N. Riga, G. Diamant, Yuting Zhang
    Providing soft bandwidth guarantees using elastic TCP-based tunnels. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:760-765 [Conf]
  4. Yuting Zhang, Azer Bestavros, Mina Guirguis, Ibrahim Matta, Richard West
    Friendly virtual machines: leveraging a feedback-control model for application adaptation. [Citation Graph (0, 0)][DBLP]
    VEE, 2005, pp:2-12 [Conf]
  5. Mina Guirguis, Azer Bestavros, Ibrahim Matta
    Exogenous-loss aware traffic management in overlay networks: Toward global fairness. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2006, v:50, n:13, pp:2331-2348 [Journal]
  6. Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuting Zhang
    Adversarial exploits of end-systems adaptation dynamics. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2007, v:67, n:3, pp:318-335 [Journal]
  7. Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuting Zhang
    Reduction of Quality (RoQ) Attacks on Dynamic Load Balancers: Vulnerability Assessment and Design Tradeoffs. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:857-865 [Conf]

  8. An SSVEP based BCI System for a Wheelchair Control. [Citation Graph (, )][DBLP]


  9. BEXPLORER: Computer and Communication Control Using EEG. [Citation Graph (, )][DBLP]


  10. HELP: // Hypertext In-Emergency Leveraging Protocol. [Citation Graph (, )][DBLP]


  11. Liberating TCP: The Free and the Stunts. [Citation Graph (, )][DBLP]


  12. Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks. [Citation Graph (, )][DBLP]


  13. Stealthy IP Prefix Hijacking: Don't Bite Off More Than You Can Chew. [Citation Graph (, )][DBLP]


  14. On the Safety and Security of Path Splicing: A Case Study for Path Splicing on the GEANT Network. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002