Opnet modeler and ns-2: Comparing the accuracy of network simulators for packet-level analysis using a network testbed GF Lucio, M Paredes-Farrera, E Jammeh, M Fleury, MJ Reed wseas transactions on computers 2 (3), 700-707, 2003 | 234 | 2003 |
IP over ICN-the better IP? D Trossen, MJ Reed, J Riihijärvi, M Georgiades, N Fotiou, G Xylomenos 2015 European conference on networks and communications (EuCNC), 413-417, 2015 | 79 | 2015 |
Identification of discrete Volterra series using maximum length sequences MJ Reed, MOJ Hawksford IEE Proceedings-Circuits, Devices and Systems 143 (5), 241-248, 1996 | 64 | 1996 |
Methodologies for detecting DoS/DDoS attacks against network servers M Alenezi, M Reed ICSNC 2012, 103, 2012 | 52 | 2012 |
Enabling efficient source and path verification via probabilistic packet marking B Wu, K Xu, Q Li, Z Liu, YC Hu, MJ Reed, M Shen, F Yang 2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS), 1-10, 2018 | 45 | 2018 |
Stateless multicast switching in software defined networks MJ Reed, M Al-Naday, N Thomos, D Trossen, G Petropoulos, S Spirou 2016 IEEE International Conference on Communications (ICC), 1-7, 2016 | 44 | 2016 |
Authenticated secret key generation in delay-constrained wireless systems M Mitev, A Chorti, M Reed, L Musavian EURASIP Journal on Wireless Communications and Networking 2020, 1-29, 2020 | 40 | 2020 |
BDS: A centralized near-optimal overlay network for inter-datacenter data replication Y Zhang, J Jiang, K Xu, X Nie, MJ Reed, H Wang, G Yao, M Zhang, ... Proceedings of the Thirteenth EuroSys Conference, 1-14, 2018 | 40 | 2018 |
Securing SDN-controlled IoT networks through edge blockchain J Hu, M Reed, N Thomos, MF AI-Naday, K Yang IEEE Internet of Things Journal 8 (4), 2102-2115, 2020 | 36 | 2020 |
Hierarchical machine learning for IoT anomaly detection in SDN P Amangele, MJ Reed, M Al-Naday, N Thomos, M Nowak 2019 International Conference on Information Technologies (InfoTech), 1-4, 2019 | 36 | 2019 |
Information resilience: source recovery in an information-centric network MF Al-Naday, MJ Reed, D Trossen, K Yang IEEE network 28 (3), 36-42, 2014 | 32 | 2014 |
Attack graph-based risk assessment and optimisation approach M Alhomidi, M Reed International Journal of Network Security & Its Applications 6 (3), 31, 2014 | 31 | 2014 |
Efficient implementation of the Volterra filter MJ Reed, MOJ Hawksford IEE Proceedings-Vision, Image and Signal Processing 147 (2), 109-114, 2000 | 31 | 2000 |
Confidentiality of a selectively encrypted H. 264 coded video bit-stream MN Asghar, M Ghanbari, M Fleury, MJ Reed Journal of Visual Communication and Image Representation 25 (2), 487-498, 2014 | 29 | 2014 |
Attack graphs representations MA Alhomidi, MJ Reed 2012 4th Computer Science and Electronic Engineering Conference (CEEC), 83-88, 2012 | 28 | 2012 |
Optimized hash for network path encoding with minimized false positives L Carrea, A Vernitski, M Reed Computer networks 58, 180-191, 2014 | 26 | 2014 |
Risk assessment and analysis through population-based attack graph modelling M Alhomidi, M Reed World Congress on Internet Security (WorldCIS-2013), 19-24, 2013 | 26 | 2013 |
Practical modeling of nonlinear audio systems using the volterra series MJ Reed, MJ Hawksford Audio Engineering Society Convention 100, 1996 | 26 | 1996 |
Sufficient encryption based on entropy coding syntax elements of H. 264/SVC MN Asghar, M Ghanbari, M Fleury, MJ Reed Multimedia Tools and Applications 74, 10215-10241, 2015 | 24 | 2015 |
Scalability of information centric networking using mediated topology management BA Alzahrani, MJ Reed, J Riihijärvi, VG Vassilakis Journal of Network and Computer Applications 50, 126-133, 2015 | 24 | 2015 |