Detecting distributed signature-based intrusion: The case of multi-path routing attacksJiefei MaFranck Leet al.2015INFOCOM 2015
An Overview of A Load Balancer Architecture for VNF chains Horizontal ScalingJiefei MaWindhya Rankothgeet al.2018CNSM/HiPNet/SR+SFC 2018
Towards making network function virtualization a cloud computing serviceWindhya RankothgeJiefei Maet al.2015IM 2015
Expressive policy analysis with enhanced system dynamicityRobert CravenJorge Loboet al.2009ASIACCS 2009