Cited By
View all- Dissanayaka AMengel SGittner LKhan H(2020)Vulnerability Prioritization, Root Cause Analysis, and Mitigation of Secure Data Analytic Framework Implemented with MongoDB on Singularity Linux ContainersProceedings of the 2020 the 4th International Conference on Compute and Data Analysis10.1145/3388142.3388168(58-66)Online publication date: 9-Mar-2020
- Kremer GOwezarski PBerthou PLoureiro AWu HYu R(2017)Cross Fertilization Between Wireless Testbeds and NS-3 Simulation ModelsProceedings of the 20th ACM International Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems10.1145/3127540.3127550(295-302)Online publication date: 21-Nov-2017
- Cheng PPark JPatel KAmante SZhang L(2012)Explaining BGP Slow Table TransfersProceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems10.1109/ICDCS.2012.14(657-666)Online publication date: 18-Jun-2012
- Show More Cited By