default search action
Jelena Mirkovic
Person information
- affiliation: University of Southern California, Los Angeles, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i6]Mithün Paul, Genevieve Bartlett, Jelena Mirkovic, Marjorie Freedman:
Phishing Email Detection Using Inputs From Artificial Intelligence. CoRR abs/2405.12494 (2024) - 2023
- [j24]A. S. M. Rizvi, Jelena Mirkovic, John S. Heidemann, Wesley Hardaker, Robert Story:
Defending Root DNS Servers against DDoS Using Layered Defenses (Extended). Ad Hoc Networks 151: 103259 (2023) - [j23]Natalija Vlajic, Jelena Mirkovic, Robert Noce:
Guest Editorial: Security of Communication Protocols in Industrial Control Systems (ICSs). IEEE Commun. Mag. 61(6): 20 (2023) - [c84]A. S. M. Rizvi, Jelena Mirkovic, John S. Heidemann, Wesley Hardaker, Robert Story:
Defending Root DNS Servers Against DDoS Using Layered Defenses. COMSNETS 2023: 513-521 - [c83]Sivaramakrishnan Ramanathan, Ying Zhang, Mohab Gawish, Yogesh Mundada, Zhaodong Wang, Sangki Yun, Eric Lippert, Walid Taha, Minlan Yu, Jelena Mirkovic:
Practical Intent-driven Routing Configuration Synthesis. NSDI 2023: 629-644 - [c82]Rajat Tandon, Haoda Wang, Nicolaas Weideman, Shushan Arakelyan, Genevieve Bartlett, Christophe Hauser, Jelena Mirkovic:
Leader: Defense Against Exploit-Based Denial-of-Service Attacks on Web Applications. RAID 2023: 744-758 - [i5]Jacob Ginesin, Jelena Mirkovic:
Understanding DNS Query Composition at B-Root. CoRR abs/2308.07966 (2023) - 2022
- [j22]Lata Nautiyal, Awais Rashid, Joseph Hallett, Ben Shreeve, Michael K, Chris Ensor, Catherine H, Jelena Mirkovic, Blair Taylor:
The United Kingdom's Cyber Security Degree Certification Program: A Cyber Security Body of Knowledge Case Study. IEEE Secur. Priv. 20(1): 87-95 (2022) - [j21]Fabio Massacci, Antonino Sabetta, Jelena Mirkovic, Toby Murray, Hamed Okhravi, Mohammad Mannan, Anderson Rocha, Eric Bodden, Daniel E. Geer:
"Free" as in Freedom to Protest? IEEE Secur. Priv. 20(5): 16-21 (2022) - [j20]Rajat Tandon, Pithayuth Charnsethikul, Ishank Arora, Dhiraj Murthy, Jelena Mirkovic:
I know what you did on Venmo: Discovering privacy leaks in mobile social payments. Proc. Priv. Enhancing Technol. 2022(3): 200-221 (2022) - [c81]Jacob Ginesin, Jelena Mirkovic:
Understanding DNS Query Composition at B-Root. BDCAT 2022: 265-270 - [c80]Le Binh, Rajat Tandon, Chingis Oinar, Jeffrey Liu, Uma Durairaj, Jiani Guo, Spencer Zahabizadeh, Sanjana Ilango, Jeremy Tang, Fred Morstatter, Simon S. Woo, Jelena Mirkovic:
Samba: Identifying Inappropriate Videos for Young Children on YouTube. CIKM 2022: 88-97 - [c79]Xiyue Deng, Jelena Mirkovic:
Polymorphic Malware Behavior Through Network Trace Analysis. COMSNETS 2022: 138-146 - [c78]Zhiying Xu, Sivaramakrishnan Ramanathan, Alexander M. Rush, Jelena Mirkovic, Minlan Yu:
Xatu: boosting existing DDoS detection systems using auxiliary signals. CoNEXT 2022: 1-17 - [c77]Rajat Tandon, Pithayuth Charnsethikul, Michalis Kallitsis, Jelena Mirkovic:
AMON-SENSS: Scalable and Accurate Detection of Volumetric DDoS Attacks at ISPs. GLOBECOM 2022: 3399-3404 - [c76]Nicolaas Weideman, Haoda Wang, Tyler Kann, Spencer Zahabizadeh, Wei-Cheng Wu, Rajat Tandon, Jelena Mirkovic, Christophe Hauser:
Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables. RAID 2022: 276-291 - [c75]David M. Balenson, Terry Benzel, Eric Eide, David Emmerich, David Johnson, Jelena Mirkovic, Laura Tinnel:
Toward Findable, Accessible, Interoperable, and Reusable Cybersecurity Artifacts. CSET @ USENIX Security Symposium 2022: 65-70 - [i4]Jelena Mirkovic, Yebo Feng, Jun Li:
Measuring Changes in Regional Network Traffic Due to COVID-19 Stay-at-Home Measures. CoRR abs/2203.00742 (2022) - [i3]A. S. M. Rizvi, Jelena Mirkovic, John S. Heidemann, Wesley Hardaker, Robert Story:
Defending Root DNS Servers Against DDoS Using Layered Defenses. CoRR abs/2209.07491 (2022) - [i2]Jeffrey Liu, Rajat Tandon, Uma Durairaj, Jiani Guo, Spencer Zahabizadeh, Sanjana Ilango, Jeremy Tang, Neelesh Gupta, Zoe Zhou, Jelena Mirkovic:
Did your child get disturbed by an inappropriate advertisement on YouTube? CoRR abs/2211.02356 (2022) - [i1]Rafail Kartsioukas, Rajat Tandon, Zheng Gao, Jelena Mirkovic, Michalis Kallitsis, Stilian Stoev:
Detection of Sparse Anomalies in High-Dimensional Network Telescope Signals. CoRR abs/2211.04918 (2022) - 2021
- [j19]Sean Peisert, Bruce Schneier, Hamed Okhravi, Fabio Massacci, Terry Benzel, Carl E. Landwehr, Mohammad Mannan, Jelena Mirkovic, Atul Prakash, James Bret Michael:
Perspectives on the SolarWinds Incident. IEEE Secur. Priv. 19(2): 7-13 (2021) - [j18]Fariborz Farahmand, Jens Grossklags, Jelena Mirkovic, Bill Newhouse:
Integrating Cybersecurity and Artificial Intelligence Research in Engineering and Computer Science Education. IEEE Secur. Priv. 19(6): 104-110 (2021) - [c74]Rajat Tandon, Abhinav Palia, Jaydeep Ramani, Brandon Paulsen, Genevieve Bartlett, Jelena Mirkovic:
Defending Web Servers Against Flash Crowd Attacks. ACNS (2) 2021: 338-361 - [c73]Jelena Mirkovic, Portia Pusey:
User Experiences on Network Testbeds. CSET @ USENIX Security Symposium 2021: 72-82 - 2020
- [c72]Rajat Tandon, Jelena Mirkovic, Pithayuth Charnsethikul:
Quantifying Cloud Misbehavior. CloudNet 2020: 1-8 - [c71]Giorgio Di Tizio, Fabio Massacci, Luca Allodi, Stanislav Dashevskyi, Jelena Mirkovic:
An Experimental Approach for Estimating Cyber Risk: a Proposal Building upon Cyber Ranges and Capture the Flags. EuroS&P Workshops 2020: 56-65 - [c70]Sivaramakrishnan Ramanathan, Anushah Hossain, Jelena Mirkovic, Minlan Yu, Sadia Afroz:
Quantifying the Impact of Blocklisting in the Age of Address Reuse. Internet Measurement Conference 2020: 360-369 - [c69]Sivaramakrishnan Ramanathan, Jelena Mirkovic, Minlan Yu:
BLAG: Improving the Accuracy of Blacklists. NDSS 2020 - [c68]Jelena Mirkovic, Aashray Aggarwal, David Weinmann, Paul Lepe, Jens Mache, Richard Weiss:
Using Terminal Histories to Monitor Student Progress on Hands-on Exercises. SIGCSE 2020: 866-872
2010 – 2019
- 2019
- [j17]Simon S. Woo, Ron Artstein, Elsi Kaiser, Xiao Le, Jelena Mirkovic:
Using Episodic Memory for User Authentication. ACM Trans. Priv. Secur. 22(2): 11:1-11:34 (2019) - [c67]Amanda Hickey, Emma Hayiou-Thomas, Jelena Mirkovic:
Grammatical Generalisation in Statistical Learning: Is it implicit and invariant across development? CogSci 2019: 1908-1914 - [c66]Jelena Mirkovic, Simon S. Woo:
Designing for Fallible Humans. CIC 2019: 298-305 - [c65]Paul Lepe, Aashray Aggarwal, Jelena Mirkovic, Jens Mache, Richard Weiss, David Weinmann:
Measuring Student Learning On Network Testbeds. ICNP 2019: 1-2 - [c64]Rajat Tandon, Abhinav Palia, Jaydeep Ramani, Brandon Paulsen, Genevieve Bartlett, Jelena Mirkovic:
Defending Web Servers Against Flash Crowd Attacks. ICNP 2019: 1-2 - 2018
- [j16]Hao Shi, Jelena Mirkovic, Abdulla Alwabel:
Handling Anti-Virtual Machine Techniques in Malicious Software. ACM Trans. Priv. Secur. 21(1): 2:1-2:31 (2018) - [c63]Sivaramakrishnan Ramanathan, Jelena Mirkovic, Minlan Yu, Ying Zhang:
SENSS Against Volumetric DDoS Attacks. ACSAC 2018: 266-277 - [c62]Ameya Hanamsagar, Simon S. Woo, Chris Kanich, Jelena Mirkovic:
Leveraging Semantic Transformation to Investigate Password Habits and Their Causes. CHI 2018: 570 - [c61]Stian Jessen, Jelena Mirkovic, Marianne Westeng:
Game experience preferences of people with chronic illnesses. NordiCHI 2018: 898-903 - [c60]Simon S. Woo, Jelena Mirkovic:
GuidedPass: Helping Users to Create Strong and Memorable Passwords. RAID 2018: 250-270 - [c59]Xiyue Deng, Jelena Mirkovic:
Malware Analysis Through High-level Behavior. CSET @ USENIX Security Symposium 2018 - [c58]Jelena Mirkovic, Genevieve Bartlett, Jim Blythe:
DEW: Distributed Experiment Workflows. CSET @ USENIX Security Symposium 2018 - 2017
- [c57]Jelena Mirkovic, Erik Kline, Peter L. Reiher:
RESECT: Self-Learning Traffic Filters for IP Spoofing Defense. ACSAC 2017: 474-485 - [c56]Xiyue Deng, Jelena Mirkovic:
Commoner Privacy And A Study On Network Traces. ACSAC 2017: 566-576 - [c55]Stian Jessen, Jelena Mirkovic, Cornelia M. Ruland:
User and Stakeholder Requirements of eHealth Support Tool Viewed In a Self-Determination Theory Lens. CBMS 2017: 682-683 - [c54]Hao Shi, Jelena Mirkovic:
Hiding debuggers from malware with apate. SAC 2017: 1703-1710 - [c53]Jelena Mirkovic, Genevieve Bartlett, John S. Heidemann, Hao Shi, Xiyue Deng:
Do you see me now? Sparsity in passive observations of address liveness. TMA 2017: 1-9 - 2016
- [c52]Simon S. Woo, Elsi Kaiser, Ron Artstein, Jelena Mirkovic:
Life-experience passwords (LEPs). ACSAC 2016: 113-126 - [c51]Simon S. Woo, Zuyao Li, Jelena Mirkovic:
Good Automatic Authentication Question Generation. INLG 2016: 203-206 - [p1]John Wroclawski, Terry V. Benzel, Jim Blythe, Ted Faber, Alefiya Hussain, Jelena Mirkovic, Stephen Schwab:
DETERLab and the DETER Project. The GENI Book 2016: 35-62 - 2015
- [j15]Melissa Dark, Jelena Mirkovic:
Evaluation Theory and Practice Applied to Cybersecurity Education. IEEE Secur. Priv. 13(2): 75-80 (2015) - [j14]Jelena Mirkovic, Melissa Dark, Wenliang Du, Giovanni Vigna, Tamara Denning:
Evaluating Cybersecurity Education Interventions: Three Case Studies. IEEE Secur. Priv. 13(3): 63-69 (2015) - [c50]Genevieve Bartlett, Jelena Mirkovic:
Expressing Different Traffic Models Using the LegoTG Framework. ICDCS Workshops 2015: 56-63 - [e3]Jelena Mirkovic, Yong Liu:
Passive and Active Measurement - 16th International Conference, PAM 2015, New York, NY, USA, March 19-20, 2015, Proceedings. Lecture Notes in Computer Science 8995, Springer 2015, ISBN 978-3-319-15508-1 [contents] - 2014
- [j13]Simon S. Woo, Jelena Mirkovic:
Optimal application allocation on multiple public clouds. Comput. Networks 68: 138-148 (2014) - [c49]Akram Farhadi, Buffy Lloyd, Danielle Groat, Jelena Mirkovic, Curtiss B. Cook, Adela Grando:
iDECIDE: A Mobile Application for Pre-Meal Insulin Dosing Using an Evidence Based Equation to Account for Patient Preferences. AMIA 2014 - [c48]Jelena Mirkovic, Maria Sims, David R. Kaufman:
Identifying eHealth literacy demands of health information seeking tasks. AMIA 2014 - [c47]Vinod Sharma, Genevieve Bartlett, Jelena Mirkovic:
Critter: Content-Rich Traffic Trace Repository. WISCS@CCS 2014: 13-20 - [c46]Minlan Yu, Ying Zhang, Jelena Mirkovic, Abdulla Alwabel:
SENSS: Software Defined Security Service. ONS 2014 - [c45]Abdulla Alwabel, Minlan Yu, Ying Zhang, Jelena Mirkovic:
SENSS: observe and control your own traffic in the internet. SIGCOMM 2014: 349-350 - [c44]Abdulla Alwabel, Hao Shi, Genevieve Bartlett, Jelena Mirkovic:
Safe and Automated Live Malware Experimentation on Public Testbeds. CSET 2014 - [c43]Jelena Mirkovic, Peter Peterson:
Class Capture-the-Flag Exercises. 3GSE 2014 - [c42]Hao Shi, Abdulla Alwabel, Jelena Mirkovic:
Cardinal Pill Testing of System Virtual Machines. USENIX Security Symposium 2014: 271-285 - 2013
- [b1]Jelena Mirkovic:
Usability, Security, and Mobility for Mobile Devices in Healthcare Information Systems. University of Oslo, Norway, 2013 - [j12]Claas Busemann, Vangelis Gazis, Richard Gold, Panayotis Kikiras, Alessandro Leonardi, Jelena Mirkovic, Maximilian Walther, Holger Ziekow:
Integrating Sensor Networks for Energy Monitoring with Service-Oriented Architectures. Int. J. Distributed Sens. Networks 9 (2013) - [c41]Jelena Mirkovic, M. Gareth Gaskell:
Nap-related consolidation in learning the grammar and vocabulary of a novel language. CogSci 2013 - [c40]Jelena Mirkovic:
Utilizing emerging technologies to promote more efficient face-to-face patient-clinician communication. UbiComp (Adjunct Publication) 2013: 1393-1396 - 2012
- [j11]Jelena Mirkovic, Terry Benzel:
Teaching Cybersecurity with DeterLab. IEEE Secur. Priv. 10(1): 73-76 (2012) - [c39]Jelena Mirkovic, Hao Shi, Alefiya Hussain:
Reducing allocation errors in network testbeds. Internet Measurement Conference 2012: 495-508 - [c38]Claas Busemann, Vangelis Gazis, Richard Gold, Panayotis Kikiras, A. Kovacevic, Alessandro Leonardi, Jelena Mirkovic, Maximilian Walther, Holger Ziekow:
Enabling the usage of sensor networks with service-oriented architectures. MidSens 2012: 1 - [c37]Jelena Mirkovic, Haakon Bryhni, Cornelia M. Ruland:
A framework for the development of ubiquitous patient support systems. PervasiveHealth 2012: 81-88 - [c36]Jelena Mirkovic, Abdulla Alwabel, Ted Faber:
Beyond Disk Imaging for Preserving User State in Network Testbeds. CSET 2012 - 2011
- [j10]Jelena Mirkovic, Mark S. Seidenberg, Marc F. Joanisse:
Rules Versus Statistics: Insights From a Highly Inflected Language. Cogn. Sci. 35(4): 638-681 (2011) - [j9]Jelena Mirkovic, Ezra Kissel:
Comparative Evaluation of Spoofing Defenses. IEEE Trans. Dependable Secur. Comput. 8(2): 218-232 (2011) - [c35]Jelena Mirkovic, Sarah Forrest, M. Gareth Gaskell:
Semantic Regularities in Grammatical Categories: Learning Grammatical Gender in an Artificial Language. CogSci 2011 - [c34]Arun Viswanathan, Alefiya Hussain, Jelena Mirkovic, Stephen Schwab, John Wroclawski:
A Semantic Framework for Data Analysis in Networked Systems. NSDI 2011 - [r1]Jelena Mirkovic:
Collaborative DoS Defenses. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 217-220 - 2010
- [j8]Songjie Wei, Alefiya Hussain, Jelena Mirkovic, Calvin Ko:
Tools for worm experimentation on the DETER testbed. Int. J. Commun. Networks Distributed Syst. 5(1/2): 151-171 (2010) - [e2]Terry V. Benzel, Jelena Mirkovic, Angelos Stavrou:
3rd Workshop on Cyber Security Experimentation and Test, CSET '10, Washington, D.C., USA, August 9, 2010. USENIX Association 2010 [contents]
2000 – 2009
- 2009
- [j7]Gerry Altmann, Jelena Mirkovic:
Incrementality and Prediction in Human Sentence Processing. Cogn. Sci. 33(4): 583-609 (2009) - [j6]Jelena Mirkovic, Alefiya Hussain, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas:
Accurately Measuring Denial of Service in Simulation and Testbed Experiments. IEEE Trans. Dependable Secur. Comput. 6(2): 81-95 (2009) - [c33]Erik Kline, Matt Beaumont-Gay, Jelena Mirkovic, Peter L. Reiher:
RAD: Reflector Attack Defense Using Message Authentication Codes. ACSAC 2009: 269-278 - [c32]Georgios Oikonomou, Jelena Mirkovic:
Modeling Human Behavior for Defense Against Flash-Crowd Attacks. ICC 2009: 1-6 - [c31]Songjie Wei, Calvin Ko, Jelena Mirkovic, Alefiya Hussain:
Tools for worm experimentation on the DETER testbed. TRIDENTCOM 2009: 1-10 - [e1]Terry V. Benzel, Jelena Mirkovic, Angelos Stavrou:
2nd Workshop on Cyber Security Experimentation and Test, CSET '09, Montreal, Canada, August 10, 2009. USENIX Association 2009 [contents] - 2008
- [j5]Jun Li, Jelena Mirkovic, Toby Ehrenkranz, Mengqiu Wang, Peter L. Reiher, Lixia Zhang:
Learning the valid incoming direction of IP packets. Comput. Networks 52(2): 399-417 (2008) - [j4]Jelena Mirkovic, Peter L. Reiher, Christos Papadopoulos, Alefiya Hussain, Marla Shepard, Michael Berg, Robert Jung:
Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise. IEEE Trans. Computers 57(8): 1098-1112 (2008) - [c30]Jelena Mirkovic:
Fairness and Delay in MU-MIMO WLANs. CCNC 2008: 548-549 - [c29]Jelena Mirkovic:
Privacy-safe network trace sharing via secure queries. NDA 2008: 3-10 - [c28]Mohit Mehta, Kanika Thapar, George C. Oikonomou, Jelena Mirkovic:
Combining Speak-Up with DefCOM for Improved DDoS Defense. ICC 2008: 1708-1714 - [c27]Songjie Wei, Jelena Mirkovic:
Correcting congestion-based error in network telescope's observations of worm dynamics. Internet Measurement Conference 2008: 125-130 - [c26]Jelena Mirkovic, Bernhard Walke, Jordi Gomez Garcia:
Channel aware scheduling in MIMO based WLANs in the presence of channel uncertainty. ISWCS 2008: 406-410 - [c25]Jelena Mirkovic, Karen R. Sollins, John Wroclawski:
Managing the Health of Security Experiments. CSET 2008 - [c24]Jelena Mirkovic, Bernhard Walke:
Theoretical Analysis of Saturation Throughput in MU-DCF. VTC Spring 2008: 2277-2281 - [c23]Jelena Mirkovic, Bernhard Walke:
On Performance of MIMO Link Adaptation in the Presence of Channel Uncertainty. WiMob 2008: 84-89 - 2007
- [c22]Jelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas, Wei-Min Yao, Stephen Schwab:
Towards user-centric metrics for denial-of-service measurement. Experimental Computer Science 2007: 8 - [c21]Jelena Mirkovic, Jing Zhao, Dee Denteneer:
A MAC Protocol with Multi-User MIMO Support for Ad-Hoc WLANs. PIMRC 2007: 1-5 - [c20]Georgios Orfanos, Jelena Mirkovic, Bernhard Walke, Sunil Kumar Emmadi:
A Centralized MAC Protocol with QoS Support for Wireless LANs. PIMRC 2007: 1-5 - [c19]Maitreya Natu, Jelena Mirkovic:
Fine-grained capabilities for flooding DDoS defense using client reputations. LSAD@SIGCOMM 2007: 105-112 - [c18]Jelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Wei-Min Yao, Peter L. Reiher, Stephen Schwab, Roshan K. Thomas:
When is service really denied?: a user-centric dos metric. SIGMETRICS 2007: 357-358 - [c17]Jelena Mirkovic, Songjie Wei, Alefiya Hussain, Brett Wilson, Roshan K. Thomas, Stephen Schwab, Sonia Fahmy, Roman Chertov, Peter L. Reiher:
DDoS Benchmarks and Experimenter's Workbench for the DETER Testbed. TRIDENTCOM 2007: 1-7 - [c16]Jelena Mirkovic, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas:
Automating DDoS Experimentation. DETER 2007 - [c15]Jelena Mirkovic, Georgios Orfanos, Hans-Jürgen Reumerman, Dee Denteneer:
A MAC Protocol for MIMO Based IEEE 802.11 Wireless Local Area Networks. WCNC 2007: 2131-2136 - 2006
- [c14]George C. Oikonomou, Jelena Mirkovic, Peter L. Reiher, Max Robinson:
A Framework for a Collaborative DDoS Defense. ACSAC 2006: 33-42 - [c13]Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Roshan K. Thomas, Alefiya Hussain, Stephen Schwab, Calvin Ko:
Measuring denial Of service. QoP 2006: 53-58 - [c12]Songjie Wei, Jelena Mirkovic, Ezra Kissel:
Profiling and Clustering Internet Hosts. DMIN 2006: 269-275 - [c11]Jelena Mirkovic, Georgios Orfanos, Hans-Jürgen Reumerman:
MIMO Link Modeling for System Level Simulations. PIMRC 2006: 1-6 - [c10]Songjie Wei, Jelena Mirkovic:
A realistic simulation of internet-scale events. VALUETOOLS 2006: 28 - [c9]Songjie Wei, Jelena Mirkovic:
Building Reputations for Internet Clients. STM 2006: 17-30 - 2005
- [j3]Jelena Mirkovic, Peter L. Reiher:
D-WARD: A Source-End Defense against Flooding Denial-of-Service Attacks. IEEE Trans. Dependable Secur. Comput. 2(3): 216-232 (2005) - [c8]Songjie Wei, Jelena Mirkovic, D. Martin Swany:
Distributed Worm Simulation with a Realistic Internet Model. PADS 2005: 71-79 - 2004
- [j2]Jelena Mirkovic, Peter L. Reiher:
A taxonomy of DDoS attack and DDoS defense mechanisms. Comput. Commun. Rev. 34(2): 39-53 (2004) - [c7]Arif Otyakmaz, Ulrich Fornefeld, Jelena Mirkovic, Daniel C. Schultz, Erik Weiss:
Performance evaluation for IEEE 802.11G hot spot coverage using sectorised antennas. PIMRC 2004: 1460-1465 - 2003
- [c6]Max Robinson, Jelena Mirkovic, B. Scott Michel, Matthew Schnaider, Peter L. Reiher:
DefCOM: Defensive Cooperative Overlay Mesh. DISCEX (2) 2003: 101-102 - [c5]Jelena Mirkovic, Gregory Prier, Peter L. Reiher:
Source-End DDoS Defense. NCA 2003: 171-178 - [c4]Jelena Mirkovic, Max Robinson, Peter L. Reiher:
Alliance formation for DDoS defense. NSPW 2003: 11-18 - 2002
- [c3]Jelena Mirkovic, Gregory Prier, Peter L. Reiher:
Attacking DDoS at the Source. ICNP 2002: 312-321 - [c2]Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Reiher, Lixia Zhang:
SAVE: Source Address Validity Enforcement Protocol. INFOCOM 2002: 1557-1566 - 2001
- [c1]Jelena Mirkovic, Geetha Priya Venkataramani, Songwu Lu, Lixia Zhang:
A self-organizing approach to data forwarding in large-scale sensor networks. ICC 2001: 1357-1361 - 2000
- [j1]Veljko M. Milutinovic, Dragana Cvetkovic, Jelena Mirkovic:
Genetic Search Based on Multiple Mutations. Computer 33(11): 118-119 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint