Folgen
Abhrajit Ghosh
Abhrajit Ghosh
Facebook, Perspecta Labs, Vencore Labs, Applied Communication Sciences, Telcordia, Bellcore
Bestätigte E-Mail-Adresse bei fb.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Method, apparatus and program for detecting spoofed network traffic
R Vaidyanathan, A Ghosh, A Naidu, A Yamada, A Kubota, Y Sawaya, ...
US Patent 8,925,079, 2014
2212014
Voice performance in WLAN networks-an experimental study
F Anjum, M Elaoud, D Famolari, A Ghosh, R Vaidyanathan, A Dutta, ...
GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No …, 2003
1642003
System and method for correlating historical attacks with diverse indicators to generate indicator profiles for detecting and predicting future network attacks
A Vashist, R Chadha, A Ghosh, A Poylisher, Y Sawaya, A Yamada, ...
US Patent 9,386,030, 2016
1352016
Method and apparatus for detecting spoofed network traffic
R Vaidyanathan, A Ghosh, YH Cheng, A Yamada, Y Miyake
US Patent 8,281,397, 2012
1252012
Service portability of networked appliances
S Moyer, D Maples, S Tsang, A Ghosh
IEEE Communications Magazine 40 (1), 116-121, 2002
872002
Last hop topology sensitive multicasting key management
F Anjum, A Ghosh
US Patent 8,306,026, 2012
622012
Detecting errant conditions affecting home networks
D Marples, C Brightman, A Ghosh, S Moyer, S Tsang
US Patent App. 10/235,199, 2004
492004
Cognitive network load prediction method and apparatus
A Vashist, A Poylisher, SC Mau, A Ghosh, R Chadha
US Patent App. 13/004,324, 2012
452012
System and method for real-time reporting of anomalous internet protocol attacks
Y Gottlieb, A Naidu, A Ghosh, A Yamada, Y Sawaya, A Kubota
US Patent 9,130,982, 2015
422015
P-CSCF fast handoff for IMS/MMS architecture
A Dutta, A Ghosh, S Das, D Chee, K Manousakis, FJ Lin, SW Li, T Chiba, ...
US Patent 8,098,627, 2012
292012
Towards a theory of intrusion detection
G Di Crescenzo, A Ghosh, R Talpade
Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005
292005
Methods of mitigation of trombone routing in an IMS/MMD network
A Dutta, A Ghosh, J Lee, S Das, J Lin, K Manousakis, T Chiba, H Yokota, ...
US Patent 8,565,186, 2013
242013
Securing ad-hoc networks using IPsec
A Ghosh, R Talpade, M Elaoud, M Bereschinsky
MILCOM 2005-2005 IEEE Military Communications Conference, 2948-2953, 2005
242005
A methodology for feature interaction detection in the AIN 0.1 framework
FJ Lin, H Liu, A Ghosh
IEEE Transactions on Software Engineering 24 (10), 797-817, 1998
241998
Experimental VoIP capacity measurements for 802.11 b WLANs
M Elaoud, D Famolari, A Ghosh
Second IEEE Consumer Communications and Networking Conference, 2005. CCNC …, 2005
232005
QoS-aware Adaptive Middleware (QAM) for tactical MANET applications
A Ghosh, S Li, CJ Chiang, R Chadha, K Moeltner, S Ali, Y Kumar, R Bauer
2010-MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, 178-183, 2010
182010
Local area network resource manager
M Elaoud, A Ghosh, R Vaidyanathan, P Agrawal, T Kodama, Y Katsube
US Patent 7,349,378, 2008
182008
Detecting Anomalies in Active Insider Stepping Stone Attacks.
G Di Crescenzo, A Ghosh, A Kampasi, R Talpade, Y Zhang
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2 (1), 103-120, 2011
172011
InFilter: predictive ingress filtering to detect spoofed IP traffic
A Ghosh, L Wong, G Di Crescenzo, R Talpade
25th IEEE International Conference on Distributed Computing Systems …, 2005
162005
Method and system for feature interaction detection in a telecommunication network
FJ Lin, A Ghosh, H Liu
US Patent 6,185,519, 2001
162001
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20