Folgen
Abhrajit Ghosh
Abhrajit Ghosh
Facebook, Perspecta Labs, Vencore Labs, Applied Communication Sciences, Telcordia, Bellcore
Bestätigte E-Mail-Adresse bei fb.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Method, apparatus and program for detecting spoofed network traffic
R Vaidyanathan, A Ghosh, A Naidu, A Yamada, A Kubota, Y Sawaya, ...
US Patent 8,925,079, 2014
2202014
Voice performance in WLAN networks-an experimental study
F Anjum, M Elaoud, D Famolari, A Ghosh, R Vaidyanathan, A Dutta, ...
GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No …, 2003
1642003
System and method for correlating historical attacks with diverse indicators to generate indicator profiles for detecting and predicting future network attacks
A Vashist, R Chadha, A Ghosh, A Poylisher, Y Sawaya, A Yamada, ...
US Patent 9,386,030, 2016
1332016
Method and apparatus for detecting spoofed network traffic
R Vaidyanathan, A Ghosh, YH Cheng, A Yamada, Y Miyake
US Patent 8,281,397, 2012
1222012
Service portability of networked appliances
S Moyer, D Maples, S Tsang, A Ghosh
IEEE Communications Magazine 40 (1), 116-121, 2002
862002
Last hop topology sensitive multicasting key management
F Anjum, A Ghosh
US Patent 8,306,026, 2012
622012
Detecting errant conditions affecting home networks
D Marples, C Brightman, A Ghosh, S Moyer, S Tsang
US Patent App. 10/235,199, 2004
492004
System and method for real-time reporting of anomalous internet protocol attacks
Y Gottlieb, A Naidu, A Ghosh, A Yamada, Y Sawaya, A Kubota
US Patent 9,130,982, 2015
422015
Cognitive network load prediction method and apparatus
A Vashist, A Poylisher, SC Mau, A Ghosh, R Chadha
US Patent App. 13/004,324, 2012
422012
P-CSCF fast handoff for IMS/MMS architecture
A Dutta, A Ghosh, S Das, D Chee, K Manousakis, FJ Lin, SW Li, T Chiba, ...
US Patent 8,098,627, 2012
292012
Towards a theory of intrusion detection
G Di Crescenzo, A Ghosh, R Talpade
Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005
272005
Securing ad-hoc networks using IPsec
A Ghosh, R Talpade, M Elaoud, M Bereschinsky
MILCOM 2005-2005 IEEE Military Communications Conference, 2948-2953, 2005
242005
Experimental VoIP capacity measurements for 802.11 b WLANs
M Elaoud, D Famolari, A Ghosh
Second IEEE Consumer Communications and Networking Conference, 2005. CCNC …, 2005
232005
A methodology for feature interaction detection in the AIN 0.1 framework
FJ Lin, H Liu, A Ghosh
IEEE Transactions on Software Engineering 24 (10), 797-817, 1998
231998
QoS-aware Adaptive Middleware (QAM) for tactical MANET applications
A Ghosh, S Li, CJ Chiang, R Chadha, K Moeltner, S Ali, Y Kumar, R Bauer
2010-MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, 178-183, 2010
182010
Local area network resource manager
M Elaoud, A Ghosh, R Vaidyanathan, P Agrawal, T Kodama, Y Katsube
US Patent 7,349,378, 2008
182008
Detecting Anomalies in Active Insider Stepping Stone Attacks.
G Di Crescenzo, A Ghosh, A Kampasi, R Talpade, Y Zhang
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2 (1), 103-120, 2011
172011
Method and system for feature interaction detection in a telecommunication network
FJ Lin, A Ghosh, H Liu
US Patent 6,185,519, 2001
162001
Managing network security policies in tactical MANETs using DRAMA
YH Cheng, A Ghosh, R Chadha, ML Gary, M Wolberg, CJ Chiang, ...
2010-MILCOM 2010 Military Communications Conference, 960-964, 2010
142010
InFilter: predictive ingress filtering to detect spoofed IP traffic
A Ghosh, L Wong, G Di Crescenzo, R Talpade
25th IEEE International Conference on Distributed Computing Systems …, 2005
142005
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20