Cloudward bound: planning for beneficial migration of enterprise applications to the cloud M Hajjat, X Sun, YWE Sung, D Maltz, S Rao, K Sripanidkulchai, ... ACM SIGCOMM Computer Communication Review 40 (4), 243-254, 2010 | 410 | 2010 |
Towards systematic design of enterprise networks YWE Sung, SG Rao, GG Xie, DA Maltz Proceedings of the 2008 ACM CoNEXT Conference, 1-12, 2008 | 160 | 2008 |
A survey of virtual LAN usage in campus networks M Yu, J Rexford, X Sun, S Rao, N Feamster IEEE Communications Magazine 49 (7), 98-103, 2011 | 67 | 2011 |
A systematic approach for evolving VLAN designs X Sun, YW Sung, SD Krothapalli, SG Rao 2010 Proceedings IEEE INFOCOM, 1-9, 2010 | 58 | 2010 |
DDoS attacks by subverting membership management in P2P systems X Sun, R Torres, S Rao 2007 3rd IEEE Workshop on Secure Network Protocols, 1-6, 2007 | 45 | 2007 |
Cronets: Cloud-routed overlay networks CX Cai, F Le, X Sun, GG Xie, H Jamjoom, RH Campbell 2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016 | 24 | 2016 |
A toolkit for automating and visualizing vlan configuration SD Krothapalli, X Sun, YWE Sung, SA Yeo, SG Rao Proceedings of the 2nd ACM workshop on Assurable and usable security …, 2009 | 24 | 2009 |
Towards securing data delivery in peer-to-peer streaming J Seibert, X Sun, C Nita-Rotaru, S Rao 2010 Second International Conference on COMmunication Systems and NETworks …, 2010 | 22 | 2010 |
Preventing DDoS attacks on internet servers exploiting P2P systems X Sun, R Torres, S Rao Computer Networks 54 (15), 2756-2774, 2010 | 21 | 2010 |
Towards systematic detection and resolution of network control conflicts DM Volpano, X Sun, GG Xie Proceedings of the third workshop on Hot topics in software defined …, 2014 | 20 | 2014 |
On the feasibility of exploiting P2P systems to launch DDoS attacks X Sun, R Torres, SG Rao Peer-to-peer networking and applications 3 (1), 36-51, 2010 | 20 | 2010 |
Modeling complexity of enterprise routing design X Sun, SG Rao, GG Xie Proceedings of the 8th international conference on Emerging networking …, 2012 | 17 | 2012 |
Minimizing network complexity through integrated top-down design X Sun, GG Xie Proceedings of the ninth ACM conference on Emerging networking experiments …, 2013 | 14 | 2013 |
Preventing DDoS attacks with P2P systems through robust membership management X Sun, R Torres, S Rao The 3rd Workshop on Secure Network Protocols (NPSec 2007), 2007 | 13 | 2007 |
A cost-benefit framework for judicious enterprise network redesign X Sun, SG Rao 2011 Proceedings IEEE INFOCOM, 221-225, 2011 | 11 | 2011 |
Enabling confidentiality of data delivery in an overlay broadcasting system R Torres, X Sun, A Walters, C Nita-Rotaru, S Rao INFOCOM, 1-9, 2007 | 10 | 2007 |
An integrated systematic approach to designing enterprise access control X Sun, GG Xie IEEE/ACM Transactions on Networking 24 (6), 3508-3522, 2016 | 9 | 2016 |
A Case for Systematic Detection and Rigorous Location of SDN Control Conflicts L Lin, X Sun 2018 IEEE 43rd Conference on Local Computer Networks (LCN), 291-294, 2018 | 3 | 2018 |
Towards a novel and optimal packet identifier design for SDN M O'Neill, A Wells, X Sun Proceedings of the third workshop on Hot topics in software defined …, 2014 | 3 | 2014 |
A software toolkit for visualizing enterprise routing design X Sun, J Wei, SG Rao, GG Xie 2011 4th Symposium on Configuration Analytics and Automation (SAFECONFIG), 1-8, 2011 | 3 | 2011 |