Architecting for innovation T Koponen, S Shenker, H Balakrishnan, N Feamster, I Ganichev, ... ACM SIGCOMM Computer Communication Review 41 (3), 24-36, 2011 | 126 | 2011 |
Cooperative security in distributed networks O Garcia-Morchon, D Kuptsov, A Gurtov, K Wehrle Computer Communications 36 (12), 1284-1297, 2013 | 46 | 2013 |
How penalty leads to improvement: A measurement study of wireless backoff in IEEE 802.11 networks D Kuptsov, B Nechaev, A Lukyanenko, A Gurtov Computer Networks 75, 37-57, 2014 | 23 | 2014 |
Distributed user authentication in wireless LANs D Kuptsov, A Khurri, A Gurtov 2009 IEEE International Symposium on a World of Wireless, Mobile and …, 2009 | 19 | 2009 |
On application of host identity protocol in wireless sensor networks A Khurri, D Kuptsov, A Gurtov The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems …, 2010 | 18 | 2010 |
Securing medical sensor network with HIP D Kuptsov, B Nechaev, A Gurtov Wireless Mobile Communication and Healthcare: Second International ICST …, 2012 | 16 | 2012 |
Performance of host identity protocol on symbian os A Khurri, D Kuptsov, A Gurtov 2009 IEEE International Conference on Communications, 1-6, 2009 | 8 | 2009 |
Brief announcement: Distributed trust management and revocation D Kuptsov, A Gurtov, O Garcia-Morchon, K Wehrle Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of …, 2010 | 7 | 2010 |
Demand-aware flow allocation in data center networks D Kuptsov, B Nechaev, A Gurtov Proceedings of the 2012 ACM workshop on Capacity sharing, 53-58, 2012 | 6 | 2012 |
A simulation study of the stochastic compensation effect for packet reordering in multipath data streaming D Korzun, D Kuptsov, A Gurtov 2015 IEEE European Modelling Symposium (EMS), 409-414, 2015 | 4 | 2015 |
STEM+: Allocating Bandwidth Fairly To Tasks A Lukyanenko, I Nikolaevskiy, D Kuptsov, A Gurtov, A Ghodsi, S Shenker Technical Report TR-14-001, 2014 | 4 | 2014 |
SAVAH: Source Address Validation with Host Identity Protocol D Kuptsov, A Gurtov Security and Privacy in Mobile Information and Communication Systems: First …, 2009 | 4 | 2009 |
A novel demand-aware fairness metric for ieee 802.11 wireless networks D Kuptsov, B Nechaev, A Gurtov, A Lukyanenko Proceedings of the 28th Annual ACM Symposium on Applied Computing, 603-610, 2013 | 2 | 2013 |
Implementing CuteHIP: Feasibility analysis of Java-based network-layer security protocols D Kuptsov Finland: Aalto University, 2011 | 2 | 2011 |
On applications of cooperative security in distributed networks D Kuptsov, O Garcia-Morchon, K Wehrle, A Gurtov Proceedings of IFIPTM 2010-4th International Conference on Trust Management …, 2010 | 2 | 2010 |
A comparative simulation study of deterministic and stochastic strategies for reduction of packet reordering in multipath data streaming D Korzun, D Kuptsov, A Gurtov International Journal of Simulation: Systems, Science and Technology 17 (33 …, 2016 | 1 | 2016 |
Improving Dependability of Networks with Penalty and Revocation Mechanisms D Kuptsov Aalto University, 2014 | 1 | 2014 |
Experimenting with Python implementation of Host Identity Protocol D Kuptsov Linux Journal, 2021 | | 2021 |
PROCEEDINGS-EMS 2015: UKSIM-AMSS 9TH IEEE EUROPEAN MODELLING SYMPOSIUM ON COMPUTER MODELLING AND SIMULATION H Guzman, M Larraga, L Alvarez-Icaza, F Huerta, B Andrievsky, ... | | 2015 |
CuteHIP: Java-based Host Identity Protocol D Kuptsov, A Gurtov | | 2010 |