![]() |
| 2007 | ||
|---|---|---|
| 4 | EE | Arnab Das, George Kesidis, Venkat Pothamsetty: Assessing discreet packet-dropping attacks using nearest-neighbor and path-vector attribution. BROADNETS 2007: 444-448 |
| 2006 | ||
| 3 | EE | Venkat Pothamsetty, Prabhaker Mateti: A case for exploit-robust and attack-aware protocol RFCs. IPDPS 2006 |
| 2005 | ||
| 2 | EE | Ihab Hamadeh, Jason Hart, George Kesidis, Venkat Pothamsetty: A Preliminary Simulation of the Effect of Scanning Worm Activity on Multicast. PADS 2005: 191-198 |
| 2004 | ||
| 1 | Venkat Pothamsetty, Bora A. Akyol: A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures. Communications, Internet, and Information Technology 2004: 168-175 | |
| 1 | Bora A. Akyol | [1] |
| 2 | Arnab Das | [4] |
| 3 | Ihab Hamadeh | [2] |
| 4 | Jason Hart | [2] |
| 5 | George Kesidis | [2] [4] |
| 6 | Prabhaker Mateti | [3] |