Detecting distributed signature-based intrusion: The case of multi-path routing attacksJiefei MaFranck Leet al.2015INFOCOM 2015
Experiences deploying a transparent split TCP middlebox and the implications for NFVFranck LeErich Nahumet al.2015HotMiddlebox 2015
Towards making network function virtualization a cloud computing serviceWindhya RankothgeJiefei Maet al.2015IM 2015