XIA: architecting a more trustworthy and evolvable internet D Naylor, MK Mukerjee, P Agyapong, R Grandl, R Kang, M Machado, ... ACM SIGCOMM Computer Communication Review 44 (3), 50-57, 2014 | 75 | 2014 |
Judicious QoS using cloud overlays O Haq, C Doucette, JW Byers, FR Dogar Proceedings of the 16th International Conference on emerging Networking …, 2020 | 15 | 2020 |
Linux XIA: an interoperable meta network architecture to crowdsource the future Internet M Machado, C Doucette, JW Byers 2015 ACM/IEEE Symposium on Architectures for Networking and Communications …, 2015 | 7 | 2015 |
TAK-ML: applying machine learning at the tactical edge P Chin, E Do, C Doucette, B Kalashian, D Last, N Lenz, E Lu, D Minor, ... MILCOM 2021-2021 IEEE Military Communications Conference (MILCOM), 108-114, 2021 | 3 | 2021 |
An architectural approach for mitigating next-generation denial of service attacks C Doucette Boston University, 2021 | 2 | 2021 |
A robust principal component analysis approach to DoS-related network anomaly detection C Doucette, R Broderick-Sander, B Toll, A Helsinger, N Soule, P Pal, ... Cyber Sensing 2020 11417, 47-58, 2020 | 2 | 2020 |
CASPR: judiciously using the cloud for wide-area packet recovery O Haq, C Doucette, JW Byers, FR Dogar arXiv preprint arXiv:1812.10835, 2018 | | 2018 |
Circumventing Crossfire Attacks via Limited-Access Cloud Paths C Doucette, M Machado, Q Fu, JW Byers | | |
Gatekeeper: the design and deployment of a DDoS protection system M Machado, C Doucette, Q Fu, JW Byers | | |