Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Anat Bremler-Barr
@article{DBLP:journals/corr/abs-2403-01586, author = {Bar Meyuhas and Anat Bremler{-}Barr and Tal Shapira}, title = {IoT Device Labeling Using Large Language Models}, journal = {CoRR}, volume = {abs/2403.01586}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.01586}, doi = {10.48550/ARXIV.2403.01586}, eprinttype = {arXiv}, eprint = {2403.01586}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-01586.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-02014, author = {Daniel Alfasi and Tal Shapira and Anat Bremler Barr}, title = {Unveiling Hidden Links Between Unseen Security Entities}, journal = {CoRR}, volume = {abs/2403.02014}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.02014}, doi = {10.48550/ARXIV.2403.02014}, eprinttype = {arXiv}, eprint = {2403.02014}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-02014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/anrw/Bremler-BarrHMD23, author = {Anat Bremler{-}Barr and David Hay and Bar Meyuhas and Shoham Danino}, title = {It's Not Where You Are, It's Where You Are Registered: IoT Location Impact on {MUD}}, booktitle = {Proceedings of the Applied Networking Research Workshop, {ANRW} 2023, San Francisco, CA, USA, 24 July 2023}, pages = {18--23}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3606464.3606472}, doi = {10.1145/3606464.3606472}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/anrw/Bremler-BarrHMD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/TavoriBL23, author = {Jhonatan Tavori and Anat Bremler{-}Barr and Hanoch Levy}, editor = {Dario Rossi and Stefano Secci and Olivier Bonaventure and Lili Qiu}, title = {The Cost of Retrying: Exploiting Retry-Mechanisms in Cloud Applications by DDoS Attacks}, booktitle = {Companion of the 19th International Conference on emerging Networking EXperiments and Technologies, CoNEXT 2023, Paris, France, December 5-8, 2023}, pages = {67--68}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3624354.3630091}, doi = {10.1145/3624354.3630091}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/conext/TavoriBL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/AfekBIN23, author = {Yehuda Afek and Anat Bremler{-}Barr and Dor Israeli and Alon Noy}, editor = {Shlomi Dolev and Ehud Gudes and Pascal Paillier}, title = {Localhost Detour from Public to Private Networks}, booktitle = {Cyber Security, Cryptology, and Machine Learning - 7th International Symposium, {CSCML} 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13914}, pages = {1--17}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-34671-2\_1}, doi = {10.1007/978-3-031-34671-2\_1}, timestamp = {Thu, 29 Jun 2023 08:38:21 +0200}, biburl = {https://dblp.org/rec/conf/cscml/AfekBIN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/BremlerBarrC23, author = {Anat Bremler{-}Barr and Michael Czeizler}, title = {Tandem Attack: DDoS Attack on Microservices Auto-scaling Mechanisms}, booktitle = {{IEEE} {INFOCOM} 2023 - {IEEE} Conference on Computer Communications Workshop, Hoboken, NJ, USA, May 20, 2023}, pages = {1--2}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10225976}, doi = {10.1109/INFOCOMWKSHPS57453.2023.10225976}, timestamp = {Tue, 05 Sep 2023 20:33:23 +0200}, biburl = {https://dblp.org/rec/conf/infocom/BremlerBarrC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/BacharBH23, author = {Daniel Bachar and Anat Bremler{-}Barr and David Hay}, title = {Optimizing Service Selection and Load Balancing in Multi-Cluster Microservice Systems with {MCOSS}}, booktitle = {{IFIP} Networking Conference, {IFIP} Networking 2023, Barcelona, Spain, June 12-15, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/IFIPNetworking57963.2023.10186445}, doi = {10.23919/IFIPNETWORKING57963.2023.10186445}, timestamp = {Mon, 31 Jul 2023 13:58:25 +0200}, biburl = {https://dblp.org/rec/conf/networking/BacharBH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/systor/AlfasiSB23, author = {Daniel Alfasi and Tal Shapira and Anat Bremler{-}Barr}, editor = {Yosef Moatti and Ofer Biran and Yossi Gilad and Dejan Kostic}, title = {Next-Generation Security Entity Linkage: Harnessing the Power of Knowledge Graphs and Large Language}, booktitle = {Proceedings of the 16th {ACM} International Conference on Systems and Storage, {SYSTOR} 2023, Haifa, Israel, June 5-7, 2023}, pages = {150}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579370.3594759}, doi = {10.1145/3579370.3594759}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/systor/AlfasiSB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AfekBS23, author = {Yehuda Afek and Anat Bremler{-}Barr and Shani Stajnrod}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {NRDelegationAttack: Complexity DDoS attack on {DNS} Recursive Resolvers}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {3187--3204}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/afek}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/AfekBS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/Bremler-BarrS22, author = {Anat Bremler{-}Barr and Matan Sabag}, title = {Preventing the Flood: Incentive-Based Collaborative Mitigation for DRDoS Attacks}, booktitle = {{IFIP} Networking Conference, {IFIP} Networking 2022, Catania, Italy, June 13-16, 2022}, pages = {1--9}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/IFIPNetworking55013.2022.9829807}, doi = {10.23919/IFIPNETWORKING55013.2022.9829807}, timestamp = {Wed, 27 Jul 2022 17:54:02 +0200}, biburl = {https://dblp.org/rec/conf/networking/Bremler-BarrS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/Bremler-BarrMS22, author = {Anat Bremler{-}Barr and Bar Meyuhas and Ran Shister}, title = {{MUDIS:} {MUD} Inspection System}, booktitle = {2022 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2022, Budapest, Hungary, April 25-29, 2022}, pages = {1--3}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/NOMS54207.2022.9789891}, doi = {10.1109/NOMS54207.2022.9789891}, timestamp = {Wed, 15 Jun 2022 16:45:18 +0200}, biburl = {https://dblp.org/rec/conf/noms/Bremler-BarrMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/Bremler-BarrMS22a, author = {Anat Bremler{-}Barr and Bar Meyuhas and Ran Shister}, title = {One {MUD} to Rule Them All: IoT Location Impact}, booktitle = {2022 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2022, Budapest, Hungary, April 25-29, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/NOMS54207.2022.9789828}, doi = {10.1109/NOMS54207.2022.9789828}, timestamp = {Wed, 15 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/noms/Bremler-BarrMS22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/BroshWB22, author = {Eli Brosh and Elad Wasserstein and Anat Bremler{-}Barr}, title = {Dynamic-Deep: Tune {ECG} Task Performance and Optimize Compression in IoT Architectures}, booktitle = {2022 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2022, Budapest, Hungary, April 25-29, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/NOMS54207.2022.9789801}, doi = {10.1109/NOMS54207.2022.9789801}, timestamp = {Wed, 15 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/noms/BroshWB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-01598, author = {Bar Meyuhas and Anat Bremler{-}Barr and David Hay and Shoham Danino}, title = {It Is Not Where You Are, It Is Where You Are Registered: IoT Location Impact}, journal = {CoRR}, volume = {abs/2212.01598}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.01598}, doi = {10.48550/ARXIV.2212.01598}, eprinttype = {arXiv}, eprint = {2212.01598}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-01598.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/closer/DavidB21, author = {Ronen Ben David and Anat Bremler Barr}, editor = {Markus Helfert and Donald Ferguson and Claus Pahl}, title = {Kubernetes Autoscaling: YoYo Attack Vulnerability and Mitigation}, booktitle = {Proceedings of the 11th International Conference on Cloud Computing and Services Science, {CLOSER} 2021, Online Streaming, April 28-30, 2021}, pages = {34--44}, publisher = {{SCITEPRESS}}, year = {2021}, timestamp = {Fri, 28 May 2021 17:04:49 +0200}, biburl = {https://dblp.org/rec/conf/closer/DavidB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ithings/AfekBHS21, author = {Yehuda Afek and Anat Bremler{-}Barr and David Hay and Avraham Shalev}, title = {MUDirect: Protecting {P2P} IoT Devices with {MUD}}, booktitle = {2021 {IEEE} International Conferences on Internet of Things (iThings) and {IEEE} Green Computing {\&} Communications (GreenCom) and {IEEE} Cyber, Physical {\&} Social Computing (CPSCom) and {IEEE} Smart Data (SmartData) and {IEEE} Congress on Cybermatics (Cybermatics), Melbourne, Australia, December 6-8, 2021}, pages = {121--129}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics53846.2021.00032}, doi = {10.1109/ITHINGS-GREENCOM-CPSCOM-SMARTDATA-CYBERMATICS53846.2021.00032}, timestamp = {Fri, 11 Feb 2022 09:29:48 +0100}, biburl = {https://dblp.org/rec/conf/ithings/AfekBHS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-00542, author = {Ronen Ben David and Anat Bremler Barr}, title = {Kubernetes Autoscaling: YoYo Attack Vulnerability and Mitigation}, journal = {CoRR}, volume = {abs/2105.00542}, year = {2021}, url = {https://arxiv.org/abs/2105.00542}, eprinttype = {arXiv}, eprint = {2105.00542}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-00542.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-00606, author = {Eli Brosh and Elad Wasserstein and Anat Bremler{-}Barr}, title = {Dynamic-Deep: {ECG} Task-Aware Compression}, journal = {CoRR}, volume = {abs/2106.00606}, year = {2021}, url = {https://arxiv.org/abs/2106.00606}, eprinttype = {arXiv}, eprint = {2106.00606}, timestamp = {Fri, 11 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-00606.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/AfekBHGSAS20, author = {Yehuda Afek and Anat Bremler{-}Barr and David Hay and Ran Goldschmidt and Lior Shafir and Gafnit Avraham and Avraham Shalev}, title = {NFV-based IoT Security for Home Networks using {MUD}}, booktitle = {{NOMS} 2020 - {IEEE/IFIP} Network Operations and Management Symposium, Budapest, Hungary, April 20-24, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/NOMS47738.2020.9110329}, doi = {10.1109/NOMS47738.2020.9110329}, timestamp = {Mon, 15 Jun 2020 11:49:54 +0200}, biburl = {https://dblp.org/rec/conf/noms/AfekBHGSAS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/AfekBHSZ20, author = {Yehuda Afek and Anat Bremler{-}Barr and David Hay and Lior Shafir and Ihab Zhaika}, title = {Demo: NFV-based IoT Security at the {ISP} Level}, booktitle = {{NOMS} 2020 - {IEEE/IFIP} Network Operations and Management Symposium, Budapest, Hungary, April 20-24, 2020}, pages = {1--2}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/NOMS47738.2020.9110409}, doi = {10.1109/NOMS47738.2020.9110409}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/noms/AfekBHSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/Bremler-BarrLY20, author = {Anat Bremler{-}Barr and Haim Levy and Zohar Yakhini}, title = {IoT or NoT: Identifying IoT Devices in a Short Time Scale}, booktitle = {{NOMS} 2020 - {IEEE/IFIP} Network Operations and Management Symposium, Budapest, Hungary, April 20-24, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/NOMS47738.2020.9110451}, doi = {10.1109/NOMS47738.2020.9110451}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/noms/Bremler-BarrLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AfekBS20, author = {Yehuda Afek and Anat Bremler{-}Barr and Lior Shafir}, editor = {Srdjan Capkun and Franziska Roesner}, title = {NXNSAttack: Recursive {DNS} Inefficiencies and Vulnerabilities}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {631--648}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/afek}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/AfekBS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-09107, author = {Lior Shafir and Yehuda Afek and Anat Bremler{-}Barr}, title = {NXNSAttack: Recursive {DNS} Inefficiencies and Vulnerabilities}, journal = {CoRR}, volume = {abs/2005.09107}, year = {2020}, url = {https://arxiv.org/abs/2005.09107}, eprinttype = {arXiv}, eprint = {2005.09107}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-09107.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AfekBS20, author = {Yehuda Afek and Anat Bremler{-}Barr and Lior Shafir}, title = {NXNSAttack: Recursive {DNS} Inefficiencies and Vulnerabilities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {722}, year = {2020}, url = {https://eprint.iacr.org/2020/722}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AfekBS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/AfekBF19, author = {Yehuda Afek and Anat Bremler{-}Barr and Shir Landau Feibish}, title = {Zero-Day Signature Extraction for High-Volume Attacks}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {27}, number = {2}, pages = {691--706}, year = {2019}, url = {https://doi.org/10.1109/TNET.2019.2899124}, doi = {10.1109/TNET.2019.2899124}, timestamp = {Fri, 31 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/AfekBF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/ShafirABPS19, author = {Lior Shafir and Yehuda Afek and Anat Bremler{-}Barr and Neta Peleg and Matan Sabag}, title = {{DNS} Negative Caching in the Wild}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2019 Conference Posters and Demos, {SIGCOMM} 2019, Beijing, China, August 19-23, 2019}, pages = {143--145}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3342280.3342338}, doi = {10.1145/3342280.3342338}, timestamp = {Thu, 15 Aug 2019 09:02:14 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/ShafirABPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-00975, author = {Yehuda Afek and Anat Bremler{-}Barr and Alon Noy}, title = {Eradicating Attacks on the Internal Network with Internal Network Policy}, journal = {CoRR}, volume = {abs/1910.00975}, year = {2019}, url = {http://arxiv.org/abs/1910.00975}, eprinttype = {arXiv}, eprint = {1910.00975}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-00975.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-05647, author = {Anat Bremler{-}Barr and Haim Levy and Zohar Yakhini}, title = {IoT or NoT: Identifying IoT Devices in a ShortTime Scale}, journal = {CoRR}, volume = {abs/1910.05647}, year = {2019}, url = {http://arxiv.org/abs/1910.05647}, eprinttype = {arXiv}, eprint = {1910.05647}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-05647.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-00253, author = {Yehuda Afek and Anat Bremler{-}Barr and David Hay and Ran Goldschmidt and Lior Shafir and Gafnit Abraham and Avraham Shalev}, title = {NFV-based IoT Security for Home Networks using {MUD}}, journal = {CoRR}, volume = {abs/1911.00253}, year = {2019}, url = {http://arxiv.org/abs/1911.00253}, eprinttype = {arXiv}, eprint = {1911.00253}, timestamp = {Mon, 11 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-00253.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AfekBFS18, author = {Yehuda Afek and Anat Bremler{-}Barr and Shir Landau Feibish and Liron Schiff}, title = {Detecting heavy flows in the {SDN} match and action model}, journal = {Comput. Networks}, volume = {136}, pages = {1--12}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.02.018}, doi = {10.1016/J.COMNET.2018.02.018}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/AfekBFS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/Bremler-BarrHHH18, author = {Anat Bremler{-}Barr and Yotam Harchol and David Hay and Yacov Hel{-}Or}, title = {Encoding Short Ranges in {TCAM} Without Expansion: Efficient Algorithm and Applications}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {26}, number = {2}, pages = {835--850}, year = {2018}, url = {http://doi.ieeecomputersociety.org/10.1109/TNET.2018.2797690}, doi = {10.1109/TNET.2018.2797690}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/Bremler-BarrHHH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotweb/FeibishABCS17, author = {Shir Landau Feibish and Yehuda Afek and Anat Bremler{-}Barr and Edith Cohen and Michal Shagam}, editor = {Qun Li and Songqing Chen}, title = {Mitigating {DNS} random subdomain DDoS attacks by distinct heavy hitters sketches}, booktitle = {Proceedings of the fifth {ACM/IEEE} Workshop on Hot Topics in Web Systems and Technologies, HotWeb 2017, San Jose / Silicon Valley, CA, USA, October 12 - 14, 2017}, pages = {8:1--8:6}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3132465.3132474}, doi = {10.1145/3132465.3132474}, timestamp = {Thu, 21 Sep 2023 13:15:55 +0200}, biburl = {https://dblp.org/rec/conf/hotweb/FeibishABCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/AfekBS17, author = {Yehuda Afek and Anat Bremler{-}Barr and Lior Shafir}, title = {Network anti-spoofing with {SDN} data plane}, booktitle = {2017 {IEEE} Conference on Computer Communications, {INFOCOM} 2017, Atlanta, GA, USA, May 1-4, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/INFOCOM.2017.8057008}, doi = {10.1109/INFOCOM.2017.8057008}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/AfekBS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/Bremler-BarrBS17, author = {Anat Bremler{-}Barr and Eli Brosh and Mor Sides}, title = {DDoS attack on cloud auto-scaling mechanisms}, booktitle = {2017 {IEEE} Conference on Computer Communications, {INFOCOM} 2017, Atlanta, GA, USA, May 1-4, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/INFOCOM.2017.8057010}, doi = {10.1109/INFOCOM.2017.8057010}, timestamp = {Wed, 11 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/Bremler-BarrBS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/Bremler-BarrHMS17, author = {Anat Bremler{-}Barr and David Hay and Idan Moyal and Liron Schiff}, title = {Load balancing memcached traffic using software defined networking}, booktitle = {2017 {IFIP} Networking Conference, {IFIP} Networking 2017 and Workshops, Stockholm, Sweden, June 12-16, 2017}, pages = {1--9}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.23919/IFIPNetworking.2017.8264855}, doi = {10.23919/IFIPNETWORKING.2017.8264855}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/networking/Bremler-BarrHMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AfekBFS17, author = {Yehuda Afek and Anat Bremler{-}Barr and Shir Landau Feibish and Liron Schiff}, title = {Detecting Heavy Flows in the {SDN} Match and Action Model}, journal = {CoRR}, volume = {abs/1702.08037}, year = {2017}, url = {http://arxiv.org/abs/1702.08037}, eprinttype = {arXiv}, eprint = {1702.08037}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AfekBFS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/AfekBHHK16, author = {Yehuda Afek and Anat Bremler{-}Barr and Yotam Harchol and David Hay and Yaron Koral}, title = {Making {DPI} Engines Resilient to Algorithmic Complexity Attacks}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {24}, number = {6}, pages = {3262--3275}, year = {2016}, url = {https://doi.org/10.1109/TNET.2016.2518712}, doi = {10.1109/TNET.2016.2518712}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/AfekBHHK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/AtaryB16, author = {Alon Atary and Anat Bremler{-}Barr}, title = {Efficient Round-Trip Time monitoring in OpenFlow networks}, booktitle = {35th Annual {IEEE} International Conference on Computer Communications, {INFOCOM} 2016, San Francisco, CA, USA, April 10-14, 2016}, pages = {1--9}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/INFOCOM.2016.7524501}, doi = {10.1109/INFOCOM.2016.7524501}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/AtaryB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/Bremler-BarrHKT16, author = {Anat Bremler{-}Barr and David Hay and Daniel Krauthgamer and Shimrit Tzur{-}David}, title = {Scalable {URL} matching with small memory footprint}, booktitle = {2016 {IFIP} Networking Conference, Networking 2016 and Workshops, Vienna, Austria, May 17-19, 2016}, pages = {467--475}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/IFIPNetworking.2016.7497218}, doi = {10.1109/IFIPNETWORKING.2016.7497218}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/networking/Bremler-BarrHKT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/Bremler-BarrHH16, author = {Anat Bremler{-}Barr and Yotam Harchol and David Hay}, editor = {Marinho P. Barcellos and Jon Crowcroft and Amin Vahdat and Sachin Katti}, title = {OpenBox: {A} Software-Defined Framework for Developing, Deploying, and Managing Network Functions}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2016 Conference, Florianopolis, Brazil, August 22-26, 2016}, pages = {511--524}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2934872.2934875}, doi = {10.1145/2934872.2934875}, timestamp = {Tue, 06 Nov 2018 11:07:12 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/Bremler-BarrHH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaa/Bremler-BarrHHH16, author = {Anat Bremler{-}Barr and Yotam Harchol and David Hay and Yacov Hel{-}Or}, editor = {Christian Scheideler and Seth Gilbert}, title = {Encoding Short Ranges in {TCAM} Without Expansion: Efficient Algorithm and Applications}, booktitle = {Proceedings of the 28th {ACM} Symposium on Parallelism in Algorithms and Architectures, {SPAA} 2016, Asilomar State Beach/Pacific Grove, CA, USA, July 11-13, 2016}, pages = {35--46}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2935764.2935769}, doi = {10.1145/2935764.2935769}, timestamp = {Tue, 06 Nov 2018 16:59:33 +0100}, biburl = {https://dblp.org/rec/conf/spaa/Bremler-BarrHHH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AfekBCFS16, author = {Yehuda Afek and Anat Bremler{-}Barr and Edith Cohen and Shir Landau Feibish and Michal Shagam}, title = {Efficient Distinct Heavy Hitters for {DNS} DDoS Attack Detection}, journal = {CoRR}, volume = {abs/1612.02636}, year = {2016}, url = {http://arxiv.org/abs/1612.02636}, eprinttype = {arXiv}, eprint = {1612.02636}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AfekBCFS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ancs/SchiffAB15, author = {Liron Schiff and Yehuda Afek and Anat Bremler{-}Barr}, editor = {Gordon J. Brebner and Alex Bachmutsky and Chita R. Das}, title = {ORange: Multi Field OpenFlow based Range Classifier}, booktitle = {Proceedings of the Eleventh {ACM/IEEE} Symposium on Architectures for networking and communications systems, {ANCS} 2015, Oakland, CA, USA, May 7-8, 2015}, pages = {63--73}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ANCS.2015.7110121}, doi = {10.1109/ANCS.2015.7110121}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ancs/SchiffAB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/damon/Bremler-BarrHHH15, author = {Anat Bremler{-}Barr and Yotam Harchol and David Hay and Yacov Hel{-}Or}, editor = {Ippokratis Pandis and Martin L. Kersten}, title = {Ultra-Fast Similarity Search Using Ternary Content Addressable Memory}, booktitle = {Proceedings of the 11th International Workshop on Data Management on New Hardware, DaMoN 2015, Melbourne, VIC, Australia, May 31 - June 04, 2015}, pages = {12:1--12:10}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2771937.2771938}, doi = {10.1145/2771937.2771938}, timestamp = {Tue, 06 Nov 2018 16:58:57 +0100}, biburl = {https://dblp.org/rec/conf/damon/Bremler-BarrHHH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/BecchiBHKK15, author = {Michela Becchi and Anat Bremler{-}Barr and David Hay and Omer Kochba and Yaron Koral}, title = {Accelerating regular expression matching over compressed {HTTP}}, booktitle = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015, Kowloon, Hong Kong, April 26 - May 1, 2015}, pages = {540--548}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INFOCOM.2015.7218421}, doi = {10.1109/INFOCOM.2015.7218421}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/BecchiBHKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/Bremler-BarrTHH15, author = {Anat Bremler{-}Barr and Shimrit Tzur{-}David and Yotam Harchol and David Hay}, title = {Leveraging traffic repetitions for high-speed deep packet inspection}, booktitle = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015, Kowloon, Hong Kong, April 26 - May 1, 2015}, pages = {2578--2586}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INFOCOM.2015.7218648}, doi = {10.1109/INFOCOM.2015.7218648}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/Bremler-BarrTHH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/Bremler-BarrHH15, author = {Anat Bremler{-}Barr and Yotam Harchol and David Hay}, editor = {Theophilus Benson and Costin Raiciu}, title = {OpenBox: Enabling Innovation in Middlebox Applications}, booktitle = {Proceedings of the 2015 {ACM} {SIGCOMM} Workshop on Hot Topics in Middleboxes and Network Function Virtualization, HotMiddlebox@SIGCOMM 2015, London, United Kingdom, August 21, 2015}, pages = {67--72}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2785989.2785992}, doi = {10.1145/2785989.2785992}, timestamp = {Tue, 06 Nov 2018 11:07:11 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/Bremler-BarrHH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/SidesBR15, author = {Mor Sides and Anat Bremler{-}Barr and Elisha J. Rosensweig}, editor = {Steve Uhlig and Olaf Maennel and Brad Karp and Jitendra Padhye}, title = {Yo-Yo Attack: Vulnerability In Auto-scaling Mechanism}, booktitle = {Proceedings of the 2015 {ACM} Conference on Special Interest Group on Data Communication, {SIGCOMM} 2015, London, United Kingdom, August 17-21, 2015}, pages = {103--104}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2785956.2790017}, doi = {10.1145/2785956.2790017}, timestamp = {Wed, 21 Jul 2021 16:09:54 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/SidesBR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/AfekBFS15, author = {Yehuda Afek and Anat Bremler{-}Barr and Shir Landau Feibish and Liron Schiff}, editor = {Steve Uhlig and Olaf Maennel and Brad Karp and Jitendra Padhye}, title = {Sampling and Large Flow Detection in {SDN}}, booktitle = {Proceedings of the 2015 {ACM} Conference on Special Interest Group on Data Communication, {SIGCOMM} 2015, London, United Kingdom, August 17-21, 2015}, pages = {345--346}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2785956.2790009}, doi = {10.1145/2785956.2790009}, timestamp = {Wed, 21 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/AfekBFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AfekBS14, author = {Yehuda Afek and Anat Bremler{-}Barr and Liron Schiff}, title = {Recursive design of hardware priority queues}, journal = {Comput. Networks}, volume = {66}, pages = {52--67}, year = {2014}, url = {https://doi.org/10.1016/j.comnet.2014.03.010}, doi = {10.1016/J.COMNET.2014.03.010}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/AfekBS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Ben-PoratBL14, author = {Udi Ben{-}Porat and Anat Bremler{-}Barr and Hanoch Levy}, title = {Computer and network performance: Graduating from the "Age of Innocence"}, journal = {Comput. Networks}, volume = {66}, pages = {68--81}, year = {2014}, url = {https://doi.org/10.1016/j.comnet.2014.03.019}, doi = {10.1016/J.COMNET.2014.03.019}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Ben-PoratBL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/Bremler-BarrHK14, author = {Anat Bremler{-}Barr and David Hay and Yaron Koral}, title = {CompactDFA: Scalable Pattern Matching Using Longest Prefix Match Solutions}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {22}, number = {2}, pages = {415--428}, year = {2014}, url = {https://doi.org/10.1109/TNET.2013.2253119}, doi = {10.1109/TNET.2013.2253119}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/Bremler-BarrHK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/Bremler-BarrHHK14, author = {Anat Bremler{-}Barr and Yotam Harchol and David Hay and Yaron Koral}, editor = {Aruna Seneviratne and Christophe Diot and Jim Kurose and Augustin Chaintreau and Luigi Rizzo}, title = {Deep Packet Inspection as a Service}, booktitle = {Proceedings of the 10th {ACM} International on Conference on emerging Networking Experiments and Technologies, CoNEXT 2014, Sydney, Australia, December 2-5, 2014}, pages = {271--282}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2674005.2674984}, doi = {10.1145/2674005.2674984}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/conext/Bremler-BarrHHK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ons/AfekBS14, author = {Yehuda Afek and Anat Bremler{-}Barr and Liron Schiff}, editor = {Rob Sherwood}, title = {Cross-Entrance Consistent Range Classifier with OpenFlow}, booktitle = {Open Networking Summit 2014 - Research Track, {ONS} 2014, Santa Clara, CA, USA, March 2-4, 2014}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/ons2014/technical-sessions/presentation/afek}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/ons/AfekBS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/AfekBS14, author = {Yehuda Afek and Anat Bremler{-}Barr and Liron Schiff}, editor = {Aditya Akella and Albert G. Greenberg}, title = {Ranges and cross-entrance consistency with OpenFlow}, booktitle = {Proceedings of the third workshop on Hot topics in software defined networking, HotSDN '14, Chicago, Illinois, USA, August 22, 2014}, pages = {233--234}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2620728.2620780}, doi = {10.1145/2620728.2620780}, timestamp = {Tue, 06 Nov 2018 11:07:11 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/AfekBS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Ben-PoratBL13, author = {Udi Ben{-}Porat and Anat Bremler{-}Barr and Hanoch Levy}, title = {On the exploitation of {CDF} based wireless scheduling}, journal = {Comput. Networks}, volume = {57}, number = {10}, pages = {2193--2205}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.11.022}, doi = {10.1016/J.COMNET.2012.11.022}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Ben-PoratBL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/Ben-PoratBL13, author = {Udi Ben{-}Porat and Anat Bremler{-}Barr and Hanoch Levy}, title = {Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks}, journal = {{IEEE} Trans. Computers}, volume = {62}, number = {5}, pages = {1031--1043}, year = {2013}, url = {https://doi.org/10.1109/TC.2012.49}, doi = {10.1109/TC.2012.49}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/Ben-PoratBL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ancs/AfekB13, author = {Yehuda Afek and Anat Bremler{-}Barr and Shir Landau Feibish}, title = {Automated signature extraction for high volume attacks}, booktitle = {Symposium on Architecture for Networking and Communications Systems, {ANCS} '13, San Jose, CA, USA, October 21-22, 2013}, pages = {147--156}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ANCS.2013.6665197}, doi = {10.1109/ANCS.2013.6665197}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ancs/AfekB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaa/AfekBS13, author = {Yehuda Afek and Anat Bremler{-}Barr and Liron Schiff}, editor = {Guy E. Blelloch and Berthold V{\"{o}}cking}, title = {Recursive design of hardware priority queues}, booktitle = {25th {ACM} Symposium on Parallelism in Algorithms and Architectures, {SPAA} '13, Montreal, QC, Canada - July 23 - 25, 2013}, pages = {23--32}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2486159.2486194}, doi = {10.1145/2486159.2486194}, timestamp = {Wed, 21 Nov 2018 11:17:49 +0100}, biburl = {https://dblp.org/rec/conf/spaa/AfekBS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Bremler-BarrHH12, author = {Anat Bremler{-}Barr and David Hay and Danny Hendler}, title = {Layered interval codes for TCAM-based classification}, journal = {Comput. Networks}, volume = {56}, number = {13}, pages = {3023--3039}, year = {2012}, url = {https://doi.org/10.1016/j.comnet.2012.04.026}, doi = {10.1016/J.COMNET.2012.04.026}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Bremler-BarrHH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/AfekBK12, author = {Yehuda Afek and Anat Bremler{-}Barr and Yaron Koral}, title = {Space efficient deep packet inspection of compressed web traffic}, journal = {Comput. Commun.}, volume = {35}, number = {7}, pages = {810--819}, year = {2012}, url = {https://doi.org/10.1016/j.comcom.2012.01.017}, doi = {10.1016/J.COMCOM.2012.01.017}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/AfekBK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/Bremler-BarrH12, author = {Anat Bremler{-}Barr and Danny Hendler}, title = {Space-Efficient TCAM-Based Classification Using Gray Coding}, journal = {{IEEE} Trans. Computers}, volume = {61}, number = {1}, pages = {18--30}, year = {2012}, url = {https://doi.org/10.1109/TC.2010.267}, doi = {10.1109/TC.2010.267}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/Bremler-BarrH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/Bremler-BarrK12, author = {Anat Bremler{-}Barr and Yaron Koral}, title = {Accelerating Multipattern Matching on Compressed {HTTP} Traffic}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {20}, number = {3}, pages = {970--983}, year = {2012}, url = {https://doi.org/10.1109/TNET.2011.2172456}, doi = {10.1109/TNET.2011.2172456}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/Bremler-BarrK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ancs/AfekBHHK12, author = {Yehuda Afek and Anat Bremler{-}Barr and Yotam Harchol and David Hay and Yaron Koral}, editor = {Tilman Wolf and Andrew W. Moore and Viktor K. Prasanna}, title = {MCA\({}^{\mbox{2}}\): multi-core architecture for mitigating complexity attacks}, booktitle = {Symposium on Architecture for Networking and Communications Systems, {ANCS} '12, Austin, TX, {USA} - October 29 - 30, 2012}, pages = {235--246}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2396556.2396603}, doi = {10.1145/2396556.2396603}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ancs/AfekBHHK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/Bremler-BarrDHK12, author = {Anat Bremler{-}Barr and Shimrit Tzur{-}David and David Hay and Yaron Koral}, editor = {Albert G. Greenberg and Kazem Sohraby}, title = {Decompression-free inspection: {DPI} for shared dictionary compression over {HTTP}}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March 25-30, 2012}, pages = {1987--1995}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/INFCOM.2012.6195576}, doi = {10.1109/INFCOM.2012.6195576}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/Bremler-BarrDHK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/Ben-PoratBLP12, author = {Udi Ben{-}Porat and Anat Bremler{-}Barr and Hanoch Levy and Bernhard Plattner}, editor = {Robert Bestak and Lukas Kencl and Li Erran Li and Joerg Widmer and Hao Yin}, title = {On the Vulnerability of Hardware Hash Tables to Sophisticated Attacks}, booktitle = {{NETWORKING} 2012 - 11th International {IFIP} {TC} 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {7289}, pages = {135--148}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30045-5\_11}, doi = {10.1007/978-3-642-30045-5\_11}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/networking/Ben-PoratBLP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpsr/Bremler-BarrHH11, author = {Anat Bremler{-}Barr and Yotam Harchol and David Hay}, title = {Space-time tradeoffs in software-based deep Packet Inspection}, booktitle = {Proceedings of the 12th {IEEE} International Conference on High Performance Switching and Routing, {HPSR} 2011, 4-6 July 2011, Cartagena, Spain}, pages = {1--8}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/HPSR.2011.5985996}, doi = {10.1109/HPSR.2011.5985996}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/hpsr/Bremler-BarrHH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpsr/Bremler-BarrKZ11, author = {Anat Bremler{-}Barr and Yaron Koral and Victor Zigdon}, title = {Shift-based pattern matching for compressed web traffic}, booktitle = {Proceedings of the 12th {IEEE} International Conference on High Performance Switching and Routing, {HPSR} 2011, 4-6 July 2011, Cartagena, Spain}, pages = {222--229}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/HPSR.2011.5986030}, doi = {10.1109/HPSR.2011.5986030}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hpsr/Bremler-BarrKZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/Ben-PoratBLP11, author = {Udi Ben{-}Porat and Anat Bremler{-}Barr and Hanoch Levy and Bernhard Plattner}, title = {On the vulnerability of the proportional fairness scheduler to retransmission attacks}, booktitle = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 10-15 April 2011, Shanghai, China}, pages = {1431--1439}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/INFCOM.2011.5934930}, doi = {10.1109/INFCOM.2011.5934930}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/Ben-PoratBLP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/Bremler-BarrDGL11, author = {Anat Bremler{-}Barr and Omer Dekel and Ran Goldschmidt and Hanoch Levy}, title = {Controlling {P2P} Applications via Address Harvesting: The Skype Story}, booktitle = {25th {IEEE} International Symposium on Parallel and Distributed Processing, {IPDPS} 2011, Anchorage, Alaska, USA, 16-20 May 2011 - Workshop Proceedings}, pages = {1579--1586}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/IPDPS.2011.312}, doi = {10.1109/IPDPS.2011.312}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/Bremler-BarrDGL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netcoop/Ben-PoratBL11, author = {Udi Ben{-}Porat and Anat Bremler{-}Barr and Hanoch Levy}, title = {Network and computer performance in malicious environments: The good, the bad and the ugly}, booktitle = {5th International Conference on NETwork Games, COntrol and OPtimization, NetGCooP 2011, Paris, France, October 12-14, 2011}, pages = {1--5}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6103884/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/netcoop/Ben-PoratBL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/AfekBK11, author = {Yehuda Afek and Anat Bremler{-}Barr and Yaron Koral}, editor = {Jordi Domingo{-}Pascual and Pietro Manzoni and Sergio Palazzo and Ana Pont and Caterina M. Scoglio}, title = {Efficient Processing of Multi-connection Compressed Web Traffic}, booktitle = {{NETWORKING} 2011 - 10th International {IFIP} {TC} 6 Networking Conference, Valencia, Spain, May 9-13, 2011, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {6640}, pages = {52--65}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20757-0\_5}, doi = {10.1007/978-3-642-20757-0\_5}, timestamp = {Fri, 09 Apr 2021 18:42:27 +0200}, biburl = {https://dblp.org/rec/conf/networking/AfekBK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tma/Bremler-BarrG11, author = {Anat Bremler{-}Barr and Ran Goldschmidt}, editor = {Jordi Domingo{-}Pascual and Yuval Shavitt and Steve Uhlig}, title = {On the Stability of Skype Super Nodes}, booktitle = {Traffic Monitoring and Analysis - Third International Workshop, {TMA} 2011, Vienna, Austria, April 27, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6613}, pages = {86--99}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20305-3\_8}, doi = {10.1007/978-3-642-20305-3\_8}, timestamp = {Sun, 25 Jul 2021 11:51:22 +0200}, biburl = {https://dblp.org/rec/conf/tma/Bremler-BarrG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/Bremler-BarrHHR10, author = {Anat Bremler{-}Barr and David Hay and Danny Hendler and Ron M. Roth}, title = {{PEDS:} {A} Parallel Error Detection Scheme for {TCAM} Devices}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {18}, number = {5}, pages = {1665--1675}, year = {2010}, url = {https://doi.org/10.1109/TNET.2010.2047730}, doi = {10.1109/TNET.2010.2047730}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/Bremler-BarrHHR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/Bremler-BarrHK10, author = {Anat Bremler{-}Barr and David Hay and Yaron Koral}, title = {CompactDFA: Generic State Machine Compression for Scalable Pattern Matching}, booktitle = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 15-19 March 2010, San Diego, CA, {USA}}, pages = {659--667}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/INFCOM.2010.5462160}, doi = {10.1109/INFCOM.2010.5462160}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/Bremler-BarrHK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1011-2324, author = {Oded Argon and Anat Bremler{-}Barr and Osnat Mokryn and Dvir Schirman and Yuval Shavitt and Udi Weinsberg}, title = {On the Dynamics of {IP} Address Allocation and Availability of End-Hosts}, journal = {CoRR}, volume = {abs/1011.2324}, year = {2010}, url = {http://arxiv.org/abs/1011.2324}, eprinttype = {arXiv}, eprint = {1011.2324}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1011-2324.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Bremler-BarrCKMS09, author = {Anat Bremler{-}Barr and Nir Chen and Jussi Kangasharju and Osnat Mokryn and Yuval Shavitt}, title = {Bringing order to {BGP:} Decreasing time and message complexity}, journal = {Comput. Networks}, volume = {53}, number = {12}, pages = {2241--2256}, year = {2009}, url = {https://doi.org/10.1016/j.comnet.2009.04.001}, doi = {10.1016/J.COMNET.2009.04.001}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/Bremler-BarrCKMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/Bremler-BarrK09, author = {Anat Bremler{-}Barr and Yaron Koral}, title = {Accelerating Multi-Patterns Matching on Compressed {HTTP} Traffic}, booktitle = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 19-25 April 2009, Rio de Janeiro, Brazil}, pages = {397--405}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/INFCOM.2009.5061944}, doi = {10.1109/INFCOM.2009.5061944}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/Bremler-BarrK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/Bremler-BarrHHR09, author = {Anat Bremler{-}Barr and David Hay and Danny Hendler and Ron M. Roth}, title = {{PEDS:} {A} Parallel Error Detection Scheme for {TCAM} Devices}, booktitle = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 19-25 April 2009, Rio de Janeiro, Brazil}, pages = {1296--1304}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/INFCOM.2009.5062044}, doi = {10.1109/INFCOM.2009.5062044}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/Bremler-BarrHHR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/Bremler-BarrHH09, author = {Anat Bremler{-}Barr and David Hay and Danny Hendler}, title = {Layered Interval Codes for TCAM-Based Classification}, booktitle = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 19-25 April 2009, Rio de Janeiro, Brazil}, pages = {1305--1313}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/INFCOM.2009.5062045}, doi = {10.1109/INFCOM.2009.5062045}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/Bremler-BarrHH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/Ben-PoratBL09, author = {Udi Ben{-}Porat and Anat Bremler{-}Barr and Hanoch Levy}, title = {On the Exploitation of {CDF} Based Wireless Scheduling}, booktitle = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 19-25 April 2009, Rio de Janeiro, Brazil}, pages = {2821--2825}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/INFCOM.2009.5062239}, doi = {10.1109/INFCOM.2009.5062239}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/Ben-PoratBL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/Ben-PoratBL08, author = {Udi Ben{-}Porat and Anat Bremler{-}Barr and Hanoch Levy}, title = {Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks}, booktitle = {{INFOCOM} 2008. 27th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, {USA}}, pages = {2297--2305}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/INFOCOM.2008.298}, doi = {10.1109/INFOCOM.2008.298}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/Ben-PoratBL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmetrics/Bremler-BarrHHF08, author = {Anat Bremler{-}Barr and David Hay and Danny Hendler and Boris Farber}, editor = {Zhen Liu and Vishal Misra and Prashant J. Shenoy}, title = {Layered interval codes for tcam-based classification}, booktitle = {Proceedings of the 2008 {ACM} {SIGMETRICS} International Conference on Measurement and Modeling of Computer Systems, {SIGMETRICS} 2008, Annapolis, MD, USA, June 2-6, 2008}, pages = {445--446}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375457.1375513}, doi = {10.1145/1375457.1375513}, timestamp = {Fri, 30 Jul 2021 16:13:32 +0200}, biburl = {https://dblp.org/rec/conf/sigmetrics/Bremler-BarrHHF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Bremler-BarrHL07, author = {Anat Bremler{-}Barr and Nir Halachmi and Hanoch Levy}, title = {Protecting bursty applications against traffic aggressiveness}, journal = {Comput. Networks}, volume = {51}, number = {13}, pages = {3864--3877}, year = {2007}, url = {https://doi.org/10.1016/j.comnet.2007.04.006}, doi = {10.1016/J.COMNET.2007.04.006}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Bremler-BarrHL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/njc/Bremler-BarrE07, author = {Anat Bremler{-}Barr and Leah Epstein}, title = {Path layout on tree networks: Bounds in different label switching models}, journal = {Nord. J. Comput.}, volume = {14}, number = {1-2}, pages = {109--125}, year = {2007}, timestamp = {Mon, 28 Feb 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/njc/Bremler-BarrE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/Bremler-BarrH07, author = {Anat Bremler{-}Barr and Danny Hendler}, title = {Space-Efficient TCAM-Based Classification Using Gray Coding}, booktitle = {{INFOCOM} 2007. 26th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 6-12 May 2007, Anchorage, Alaska, {USA}}, pages = {1388--1396}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/INFCOM.2007.164}, doi = {10.1109/INFCOM.2007.164}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/Bremler-BarrH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/Bremler-BarrCKMS07, author = {Anat Bremler{-}Barr and Nir Chen and Jussi Kangasharju and Osnat Mokryn and Yuval Shavitt}, editor = {Indranil Gupta and Roger Wattenhofer}, title = {Bringing order to {BGP:} decreasing time and message complexity}, booktitle = {Proceedings of the Twenty-Sixth Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2007, Portland, Oregon, USA, August 12-15, 2007}, pages = {368--369}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1281100.1281177}, doi = {10.1145/1281100.1281177}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/podc/Bremler-BarrCKMS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/Bremler-BarrLH06, author = {Anat Bremler{-}Barr and Hanoch Levy and Nir Halachmi}, title = {Protecting Bursty Applications Against Traffic Aggressiveness}, booktitle = {Quality of Service - IWQoS 2006: 14th International Workshop, IWQoS 2006, New Haven, CT, USA, 19-21 June 2006, Proceedings}, pages = {272--273}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/IWQOS.2006.250479}, doi = {10.1109/IWQOS.2006.250479}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/Bremler-BarrLH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/Bremler-BarrL05, author = {Anat Bremler{-}Barr and Hanoch Levy}, title = {Spoofing prevention method}, booktitle = {{INFOCOM} 2005. 24th Annual Joint Conference of the {IEEE} Computer and Communications Societies, 13-17 March 2005, Miami, FL, {USA}}, pages = {536--547}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/INFCOM.2005.1497921}, doi = {10.1109/INFCOM.2005.1497921}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/Bremler-BarrL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/AfekBS04, author = {Yehuda Afek and Anat Bremler{-}Barr and Shemer Schwarz}, title = {Improved {BGP} convergence via ghost flushing}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {22}, number = {10}, pages = {1933--1948}, year = {2004}, url = {https://doi.org/10.1109/JSAC.2004.836002}, doi = {10.1109/JSAC.2004.836002}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/AfekBS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/Bremler-BarrL04, author = {Anat Bremler{-}Barr and Hanoch Levy}, editor = {Soma Chaudhuri and Shay Kutten}, title = {Brief announcement: spoofing prevention method}, booktitle = {Proceedings of the Twenty-Third Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2004, St. John's, Newfoundland, Canada, July 25-28, 2004}, pages = {375}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1011767.1011832}, doi = {10.1145/1011767.1011832}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/Bremler-BarrL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sirocco/Bremler-BarrE04, author = {Anat Bremler{-}Barr and Leah Epstein}, editor = {Rastislav Kralovic and Ondrej S{\'{y}}kora}, title = {Path Layout on Tree Networks: Bounds in Different Label Switching Models}, booktitle = {Structural Information and Communication Complexity, 11th International Colloquium , {SIROCCO} 2004, Smolenice Castle, Slovakia, June 21-23, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3104}, pages = {35--46}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27796-5\_4}, doi = {10.1007/978-3-540-27796-5\_4}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/sirocco/Bremler-BarrE04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/Bremler-BarrCKM03, author = {Anat Bremler{-}Barr and Edith Cohen and Haim Kaplan and Yishay Mansour}, title = {Predicting and bypassing end-to-end Internet service degradations}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {21}, number = {6}, pages = {961--978}, year = {2003}, url = {https://doi.org/10.1109/JSAC.2003.814614}, doi = {10.1109/JSAC.2003.814614}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/Bremler-BarrCKM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/Bremler-BarrAS03, author = {Anat Bremler{-}Barr and Yehuda Afek and Shemer Schwarz}, title = {Improved {BGP} Convergence via Ghost Flushing}, booktitle = {Proceedings {IEEE} {INFOCOM} 2003, The 22nd Annual Joint Conference of the {IEEE} Computer and Communications Societies, San Franciso, CA, USA, March 30 - April 3, 2003}, pages = {927--937}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/INFCOM.2003.1208930}, doi = {10.1109/INFCOM.2003.1208930}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/Bremler-BarrAS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/AfekBKCM02, author = {Yehuda Afek and Anat Bremler{-}Barr and Haim Kaplan and Edith Cohen and Michael Merritt}, title = {Restoration by path concatenation: fast recovery of {MPLS} paths}, journal = {Distributed Comput.}, volume = {15}, number = {4}, pages = {273--283}, year = {2002}, url = {https://doi.org/10.1007/s00446-002-0080-6}, doi = {10.1007/S00446-002-0080-6}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/AfekBKCM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/AfekBB02, author = {Yehuda Afek and Omer Ben{-}Shalom and Anat Bremler{-}Barr}, title = {On the structure and application of {BGP} policy atoms}, booktitle = {Proceedings of the 2nd {ACM} {SIGCOMM} Internet Measurement Workshop, {IMW} 2002, Marseille, France, November 6-8, 2002}, pages = {209--214}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/637201.637234}, doi = {10.1145/637201.637234}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/AfekBB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/Bremler-BarrCKM02, author = {Anat Bremler{-}Barr and Edith Cohen and Haim Kaplan and Yishay Mansour}, title = {Predicting and bypassing end-to-end internet service degradations}, booktitle = {Proceedings of the 2nd {ACM} {SIGCOMM} Internet Measurement Workshop, {IMW} 2002, Marseille, France, November 6-8, 2002}, pages = {307--320}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/637201.637248}, doi = {10.1145/637201.637248}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/Bremler-BarrCKM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/AfekBH01, author = {Yehuda Afek and Anat Bremler{-}Barr and Sariel Har{-}Peled}, title = {Routing with a clue}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {9}, number = {6}, pages = {693--705}, year = {2001}, url = {https://doi.org/10.1109/90.974524}, doi = {10.1109/90.974524}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/AfekBH01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/Bremler-BarrAKCM01, author = {Anat Bremler{-}Barr and Yehuda Afek and Haim Kaplan and Edith Cohen and Michael Merritt}, editor = {Ajay D. Kshemkalyani and Nir Shavit}, title = {Restoration by path concatenation: fast recovery of {MPLS} paths}, booktitle = {Proceedings of the Twentieth Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2001, Newport, Rhode Island, USA, August 26-29, 2001}, pages = {43--52}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/383962.383980}, doi = {10.1145/383962.383980}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/Bremler-BarrAKCM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmetrics/Bremler-BarrAKCM01, author = {Anat Bremler{-}Barr and Yehuda Afek and Haim Kaplan and Edith Cohen and Michael Merritt}, editor = {Mary K. Vernon}, title = {Restoration path concatenation: fast recovery of {MPLS} paths}, booktitle = {Proceedings of the Joint International Conference on Measurements and Modeling of Computer Systems, SIGMETRICS/Performance 2001, June 16-20, 2001, Cambridge, MA, {USA}}, pages = {316--317}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/378420.378805}, doi = {10.1145/378420.378805}, timestamp = {Fri, 30 Jul 2021 16:13:33 +0200}, biburl = {https://dblp.org/rec/conf/sigmetrics/Bremler-BarrAKCM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/AfekB00, author = {Yehuda Afek and Anat Bremler{-}Barr}, title = {Trainet: {A} New Label Switching Scheme}, booktitle = {Proceedings {IEEE} {INFOCOM} 2000, The Conference on Computer Communications, Nineteenth Annual Joint Conference of the {IEEE} Computer and Communications Societies, Reaching the Promised Land of Communications, Tel Aviv, Israel, March 26-30, 2000}, pages = {874--883}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/INFCOM.2000.832262}, doi = {10.1109/INFCOM.2000.832262}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/AfekB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/Bremler-BarrAH99, author = {Anat Bremler{-}Barr and Yehuda Afek and Sariel Har{-}Peled}, editor = {Lyman Chapin and James P. G. Sterbenz and Guru M. Parulkar and Jonathan S. Turner}, title = {Routing with a Clue}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 1999 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30 - September 3, 1999, Cambridge, Massachusetts, {USA}}, pages = {203--214}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/316188.316223}, doi = {10.1145/316188.316223}, timestamp = {Wed, 21 Jul 2021 16:09:54 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/Bremler-BarrAH99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cjtcs/AfekB98, author = {Yehuda Afek and Anat Bremler{-}Barr}, title = {Self-Stabilizing Unidirectional Network Algorithms by Power Supply}, journal = {Chic. J. Theor. Comput. Sci.}, volume = {1998}, year = {1998}, url = {http://cjtcs.cs.uchicago.edu/articles/1998/3/contents.html}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cjtcs/AfekB98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/AfekB97, author = {Yehuda Afek and Anat Bremler{-}Barr}, editor = {Michael E. Saks}, title = {Self-Stabilizing Unidirectional Network Algorithms by Power-Supply (Extended Abstract)}, booktitle = {Proceedings of the Eighth Annual {ACM-SIAM} Symposium on Discrete Algorithms, 5-7 January 1997, New Orleans, Louisiana, {USA}}, pages = {111--120}, publisher = {{ACM/SIAM}}, year = {1997}, url = {http://dl.acm.org/citation.cfm?id=314161.314193}, timestamp = {Thu, 05 Jul 2018 07:29:42 +0200}, biburl = {https://dblp.org/rec/conf/soda/AfekB97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.