Cited By
View all- Xie GLi QCui CLi RMa LQi ZJiang Y(2025)Intelligent In-Network Attack Detection on Programmable Switches With Soterv2IEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.340295522:1(440-456)Online publication date: Jan-2025
- Wang ZHu HKong LKang XMa TXiang QLi JLu YSong ZYang PWu JYang YMa TLiu ZZeng XCai DChen GBagchi SZhang Y(2024)Diagnosing application-network anomalies for millions of IPs in production cloudsProceedings of the 2024 USENIX Conference on Usenix Annual Technical Conference10.5555/3691992.3692046(885-899)Online publication date: 10-Jul-2024
- Yu LZhang XZhang HSonchack JPorts DLiu VGavrilovska ATerry D(2024)BeaverProceedings of the 18th USENIX Conference on Operating Systems Design and Implementation10.5555/3691938.3691951(233-249)Online publication date: 10-Jul-2024
- Show More Cited By