![]() | ![]() |
2007 | ||
---|---|---|
4 | EE | Arnab Das, George Kesidis, Venkat Pothamsetty: Assessing discreet packet-dropping attacks using nearest-neighbor and path-vector attribution. BROADNETS 2007: 444-448 |
2006 | ||
3 | EE | Venkat Pothamsetty, Prabhaker Mateti: A case for exploit-robust and attack-aware protocol RFCs. IPDPS 2006 |
2005 | ||
2 | EE | Ihab Hamadeh, Jason Hart, George Kesidis, Venkat Pothamsetty: A Preliminary Simulation of the Effect of Scanning Worm Activity on Multicast. PADS 2005: 191-198 |
2004 | ||
1 | Venkat Pothamsetty, Bora A. Akyol: A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures. Communications, Internet, and Information Technology 2004: 168-175 |
1 | Bora A. Akyol | [1] |
2 | Arnab Das | [4] |
3 | Ihab Hamadeh | [2] |
4 | Jason Hart | [2] |
5 | George Kesidis | [2] [4] |
6 | Prabhaker Mateti | [3] |