Mansoor Alicherry, Ph.D.
Affiliations: | 2011 | Columbia University, New York, NY |
Area:
Computer ScienceGoogle:
"Mansoor Alicherry"Parents
Sign in to add mentorAngelos D. Keromytis | grad student | 2011 | Columbia | |
(A Distributed Policy Enforcement Architecture for Mobile Ad-Hoc Networks.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Alicherry M, Lakshman TV. (2012) Network aware resource allocation in distributed clouds Proceedings - Ieee Infocom. 963-971 |
Alicherry M, Keromytis AD. (2011) Misuse detection in consent-based networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6715: 38-56 |
Alicherry M, Keromytis AD. (2010) DIPLOMA: Distributed policy enforcement architecture for MANETs Proceedings - 2010 4th International Conference On Network and System Security, Nss 2010. 89-98 |
Alicherry M, Keromytis AD. (2010) Securing MANET multicast using DIPLOMA Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6434: 232-250 |
Alicherry M, Keromytis AD. (2009) Double check: Multi-path verification against man-in-the-middle attacks Proceedings - Ieee Symposium On Computers and Communications. 557-563 |
Alicherry M, Keromytis AD, Stavrou A. (2009) Evaluating a collaborative defense architecture for MANETs 2009 Ieee International Conference On Internet Multimedia Services Architecture and Applications, Imsaa 2009 |
Alicherry M, Keromytis AD, Stavrou A. (2009) Deny-by-default distributed security policy enforcement in mobile ad hoc networks Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 19: 41-50 |
Alicherry M, Bhatia R. (2007) Simple pre-provisioning scheme to enable fast restoration Ieee Acm Transactions On Networking. 15: 400-412 |
Alicherry M, Bhatia R, Wan YC. (2007) Designing networks with hop bounded protection paths Ieee International Workshop On Quality of Service, Iwqos. 164-172 |
Stiliadis D, Francini A, Kamat S, et al. (2007) Evros: A service-delivery platform for extending security coverage and IT reach Bell Labs Technical Journal. 12: 101-119 |