316 results on '"Yehuda Afek"'
Search Results
2. A Flushing Attack on the DNS Cache.
3. NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers.
4. Localhost Detour from Public to Private Networks.
5. Decoupling DNS Update Timing from TTL Values.
6. MUDirect: Protecting P2P IoT Devices with MUD.
7. Distributed Computing with the Cloud.
8. NFV-based IoT Security for Home Networks using MUD.
9. NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities.
10. Consensus in Equilibrium: Can One Against All Decide Fairly?
11. 2022 Principles of Distributed Computing Doctoral Dissertation Award.
12. Selecting a Leader in a Network of Finite State Machines.
13. A Wealth of Sub-Consensus Deterministic Objects.
14. The Role of A-priori Information in Networks of Rational Agents.
15. The Synergy of Finite State Machines.
16. DNS Negative Caching in the Wild.
17. Zero-Day Signature Extraction for High-Volume Attacks.
18. Network anti-spoofing with SDN data plane.
19. Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters sketches.
20. Demo: NFV-based IoT Security at the ISP Level.
21. Detecting heavy flows in the SDN match and action model.
22. NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities.
23. Holdout SGD: Byzantine Tolerant Federated Learning.
24. Deterministic Objects: Life Beyond Consensus.
25. Brief Announcement: The Synergy of Finite State Machines.
26. Brief Announcement: Object Oriented Consensus.
27. ORange: Multi Field OpenFlow based Range Classifier.
28. Temporally Bounding TSO for Fence-Free Asymmetric Synchronization.
29. Amalgamated Lock-Elision.
30. A Dynamic Convolutional Layer for short rangeweather prediction.
31. Eradicating Attacks on the Internal Network with Internal Network Policy.
32. A King in every two consecutive tournaments.
33. Consensus in Equilibrium: Can One Against All Decide Fairly?
34. The Role of A-priori Information in Networks of Rational Agents.
35. NFV-based IoT Security for Home Networks using MUD.
36. Making DPI Engines Resilient to Algorithmic Complexity Attacks.
37. Fence-free work stealing on bounded TSO processors.
38. Distributed computing building blocks for rational agents.
39. Software-improved hardware lock elision.
40. Automated signature extraction for high volume attacks.
41. Fast concurrent queues for x86 processors.
42. Asynchrony from Synchrony.
43. Recursive design of hardware priority queues.
44. MCA2: multi-core architecture for mitigating complexity attacks.
45. Pessimistic Software Lock-Elision.
46. CBTree: A Practical Concurrent Self-Adjusting Search Tree.
47. Cache index-aware memory allocation.
48. Beeping a Maximal Independent Set.
49. Fast and Scalable Rendezvousing.
50. Oblivious Collaboration.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.