default search action
Anat Bremler-Barr
Person information
- affiliation: Reichman University, Herzliya, Israel
- unicode name: ענת ברמלר-בר
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c72]Daniel Alfasi, Tal Shapira, Anat Bremler-Barr:
VulnScopper: Unveiling Hidden Links Between Unseen Security Entities. GNNet@CoNEXT 2024: 33-40 - [c71]Anat Bremler-Barr, Michael Czeizler, Hanoch Levy, Jhonatan Tavori:
Exploiting Miscoordination of Microservices in Tandem for Effective DDoS Attacks. INFOCOM 2024: 231-240 - [c70]Yehuda Afek, Anat Bremler-Barr, Shoham Danino, Yuval Shavitt:
A Flushing Attack on the DNS Cache. USENIX Security Symposium 2024 - [i14]Bar Meyuhas, Anat Bremler-Barr, Tal Shapira:
IoT Device Labeling Using Large Language Models. CoRR abs/2403.01586 (2024) - [i13]Daniel Alfasi, Tal Shapira, Anat Bremler Barr:
Unveiling Hidden Links Between Unseen Security Entities. CoRR abs/2403.02014 (2024) - [i12]Shilo Daum, Tal Shapira, Anat Bremler-Barr, David Hay:
Non-uniformity is All You Need: Efficient and Timely Encrypted Traffic Classification With ECHO. CoRR abs/2406.01852 (2024) - 2023
- [c69]Anat Bremler-Barr, David Hay, Bar Meyuhas, Shoham Danino:
It's Not Where You Are, It's Where You Are Registered: IoT Location Impact on MUD. ANRW 2023: 18-23 - [c68]Jhonatan Tavori, Anat Bremler-Barr, Hanoch Levy:
The Cost of Retrying: Exploiting Retry-Mechanisms in Cloud Applications by DDoS Attacks. CoNEXT (Companion) 2023: 67-68 - [c67]Yehuda Afek, Anat Bremler-Barr, Dor Israeli, Alon Noy:
Localhost Detour from Public to Private Networks. CSCML 2023: 1-17 - [c66]Anat Bremler-Barr, Michael Czeizler:
Tandem Attack: DDoS Attack on Microservices Auto-scaling Mechanisms. INFOCOM Workshops 2023: 1-2 - [c65]Daniel Bachar, Anat Bremler-Barr, David Hay:
Optimizing Service Selection and Load Balancing in Multi-Cluster Microservice Systems with MCOSS. IFIP Networking 2023: 1-9 - [c64]Daniel Alfasi, Tal Shapira, Anat Bremler-Barr:
Next-Generation Security Entity Linkage: Harnessing the Power of Knowledge Graphs and Large Language. SYSTOR 2023: 150 - [c63]Yehuda Afek, Anat Bremler-Barr, Shani Stajnrod:
NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers. USENIX Security Symposium 2023: 3187-3204 - 2022
- [c62]Anat Bremler-Barr, Matan Sabag:
Preventing the Flood: Incentive-Based Collaborative Mitigation for DRDoS Attacks. IFIP Networking 2022: 1-9 - [c61]Anat Bremler-Barr, Bar Meyuhas, Ran Shister:
MUDIS: MUD Inspection System. NOMS 2022: 1-3 - [c60]Anat Bremler-Barr, Bar Meyuhas, Ran Shister:
One MUD to Rule Them All: IoT Location Impact. NOMS 2022: 1-5 - [c59]Eli Brosh, Elad Wasserstein, Anat Bremler-Barr:
Dynamic-Deep: Tune ECG Task Performance and Optimize Compression in IoT Architectures. NOMS 2022: 1-6 - [i11]Bar Meyuhas, Anat Bremler-Barr, David Hay, Shoham Danino:
It Is Not Where You Are, It Is Where You Are Registered: IoT Location Impact. CoRR abs/2212.01598 (2022) - 2021
- [c58]Ronen Ben David, Anat Bremler Barr:
Kubernetes Autoscaling: YoYo Attack Vulnerability and Mitigation. CLOSER 2021: 34-44 - [c57]Yehuda Afek, Anat Bremler-Barr, David Hay, Avraham Shalev:
MUDirect: Protecting P2P IoT Devices with MUD. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2021: 121-129 - [i10]Ronen Ben David, Anat Bremler Barr:
Kubernetes Autoscaling: YoYo Attack Vulnerability and Mitigation. CoRR abs/2105.00542 (2021) - [i9]Eli Brosh, Elad Wasserstein, Anat Bremler-Barr:
Dynamic-Deep: ECG Task-Aware Compression. CoRR abs/2106.00606 (2021) - 2020
- [c56]Yehuda Afek, Anat Bremler-Barr, David Hay, Ran Goldschmidt, Lior Shafir, Gafnit Avraham, Avraham Shalev:
NFV-based IoT Security for Home Networks using MUD. NOMS 2020: 1-9 - [c55]Yehuda Afek, Anat Bremler-Barr, David Hay, Lior Shafir, Ihab Zhaika:
Demo: NFV-based IoT Security at the ISP Level. NOMS 2020: 1-2 - [c54]Anat Bremler-Barr, Haim Levy, Zohar Yakhini:
IoT or NoT: Identifying IoT Devices in a Short Time Scale. NOMS 2020: 1-9 - [c53]Yehuda Afek, Anat Bremler-Barr, Lior Shafir:
NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities. USENIX Security Symposium 2020: 631-648 - [i8]Lior Shafir, Yehuda Afek, Anat Bremler-Barr:
NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities. CoRR abs/2005.09107 (2020) - [i7]Yehuda Afek, Anat Bremler-Barr, Lior Shafir:
NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities. IACR Cryptol. ePrint Arch. 2020: 722 (2020)
2010 – 2019
- 2019
- [j22]Yehuda Afek, Anat Bremler-Barr, Shir Landau Feibish:
Zero-Day Signature Extraction for High-Volume Attacks. IEEE/ACM Trans. Netw. 27(2): 691-706 (2019) - [c52]Lior Shafir, Yehuda Afek, Anat Bremler-Barr, Neta Peleg, Matan Sabag:
DNS Negative Caching in the Wild. SIGCOMM Posters and Demos 2019: 143-145 - [i6]Yehuda Afek, Anat Bremler-Barr, Alon Noy:
Eradicating Attacks on the Internal Network with Internal Network Policy. CoRR abs/1910.00975 (2019) - [i5]Anat Bremler-Barr, Haim Levy, Zohar Yakhini:
IoT or NoT: Identifying IoT Devices in a ShortTime Scale. CoRR abs/1910.05647 (2019) - [i4]Yehuda Afek, Anat Bremler-Barr, David Hay, Ran Goldschmidt, Lior Shafir, Gafnit Abraham, Avraham Shalev:
NFV-based IoT Security for Home Networks using MUD. CoRR abs/1911.00253 (2019) - 2018
- [j21]Yehuda Afek, Anat Bremler-Barr, Shir Landau Feibish, Liron Schiff:
Detecting heavy flows in the SDN match and action model. Comput. Networks 136: 1-12 (2018) - [j20]Anat Bremler-Barr, Yotam Harchol, David Hay, Yacov Hel-Or:
Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications. IEEE/ACM Trans. Netw. 26(2): 835-850 (2018) - 2017
- [c51]Shir Landau Feibish, Yehuda Afek, Anat Bremler-Barr, Edith Cohen, Michal Shagam:
Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters sketches. HotWeb 2017: 8:1-8:6 - [c50]Yehuda Afek, Anat Bremler-Barr, Lior Shafir:
Network anti-spoofing with SDN data plane. INFOCOM 2017: 1-9 - [c49]Anat Bremler-Barr, Eli Brosh, Mor Sides:
DDoS attack on cloud auto-scaling mechanisms. INFOCOM 2017: 1-9 - [c48]Anat Bremler-Barr, David Hay, Idan Moyal, Liron Schiff:
Load balancing memcached traffic using software defined networking. Networking 2017: 1-9 - [i3]Yehuda Afek, Anat Bremler-Barr, Shir Landau Feibish, Liron Schiff:
Detecting Heavy Flows in the SDN Match and Action Model. CoRR abs/1702.08037 (2017) - 2016
- [j19]Yehuda Afek, Anat Bremler-Barr, Yotam Harchol, David Hay, Yaron Koral:
Making DPI Engines Resilient to Algorithmic Complexity Attacks. IEEE/ACM Trans. Netw. 24(6): 3262-3275 (2016) - [c47]Alon Atary, Anat Bremler-Barr:
Efficient Round-Trip Time monitoring in OpenFlow networks. INFOCOM 2016: 1-9 - [c46]Anat Bremler-Barr, David Hay, Daniel Krauthgamer, Shimrit Tzur-David:
Scalable URL matching with small memory footprint. Networking 2016: 467-475 - [c45]Anat Bremler-Barr, Yotam Harchol, David Hay:
OpenBox: A Software-Defined Framework for Developing, Deploying, and Managing Network Functions. SIGCOMM 2016: 511-524 - [c44]Anat Bremler-Barr, Yotam Harchol, David Hay, Yacov Hel-Or:
Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications. SPAA 2016: 35-46 - [i2]Yehuda Afek, Anat Bremler-Barr, Edith Cohen, Shir Landau Feibish, Michal Shagam:
Efficient Distinct Heavy Hitters for DNS DDoS Attack Detection. CoRR abs/1612.02636 (2016) - 2015
- [c43]Liron Schiff, Yehuda Afek, Anat Bremler-Barr:
ORange: Multi Field OpenFlow based Range Classifier. ANCS 2015: 63-73 - [c42]Anat Bremler-Barr, Yotam Harchol, David Hay, Yacov Hel-Or:
Ultra-Fast Similarity Search Using Ternary Content Addressable Memory. DaMoN 2015: 12:1-12:10 - [c41]Michela Becchi, Anat Bremler-Barr, David Hay, Omer Kochba, Yaron Koral:
Accelerating regular expression matching over compressed HTTP. INFOCOM 2015: 540-548 - [c40]Anat Bremler-Barr, Shimrit Tzur-David, Yotam Harchol, David Hay:
Leveraging traffic repetitions for high-speed deep packet inspection. INFOCOM 2015: 2578-2586 - [c39]Anat Bremler-Barr, Yotam Harchol, David Hay:
OpenBox: Enabling Innovation in Middlebox Applications. HotMiddlebox@SIGCOMM 2015: 67-72 - [c38]Mor Sides, Anat Bremler-Barr, Elisha J. Rosensweig:
Yo-Yo Attack: Vulnerability In Auto-scaling Mechanism. SIGCOMM 2015: 103-104 - [c37]Yehuda Afek, Anat Bremler-Barr, Shir Landau Feibish, Liron Schiff:
Sampling and Large Flow Detection in SDN. SIGCOMM 2015: 345-346 - 2014
- [j18]Yehuda Afek, Anat Bremler-Barr, Liron Schiff:
Recursive design of hardware priority queues. Comput. Networks 66: 52-67 (2014) - [j17]Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy:
Computer and network performance: Graduating from the "Age of Innocence". Comput. Networks 66: 68-81 (2014) - [j16]Anat Bremler-Barr, David Hay, Yaron Koral:
CompactDFA: Scalable Pattern Matching Using Longest Prefix Match Solutions. IEEE/ACM Trans. Netw. 22(2): 415-428 (2014) - [c36]Anat Bremler-Barr, Yotam Harchol, David Hay, Yaron Koral:
Deep Packet Inspection as a Service. CoNEXT 2014: 271-282 - [c35]Yehuda Afek, Anat Bremler-Barr, Liron Schiff:
Cross-Entrance Consistent Range Classifier with OpenFlow. ONS 2014 - [c34]Yehuda Afek, Anat Bremler-Barr, Liron Schiff:
Ranges and cross-entrance consistency with OpenFlow. HotSDN 2014: 233-234 - 2013
- [j15]Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy:
On the exploitation of CDF based wireless scheduling. Comput. Networks 57(10): 2193-2205 (2013) - [j14]Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy:
Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks. IEEE Trans. Computers 62(5): 1031-1043 (2013) - [c33]Yehuda Afek, Anat Bremler-Barr, Shir Landau Feibish:
Automated signature extraction for high volume attacks. ANCS 2013: 147-156 - [c32]Yehuda Afek, Anat Bremler-Barr, Liron Schiff:
Recursive design of hardware priority queues. SPAA 2013: 23-32 - 2012
- [j13]Anat Bremler-Barr, David Hay, Danny Hendler:
Layered interval codes for TCAM-based classification. Comput. Networks 56(13): 3023-3039 (2012) - [j12]Yehuda Afek, Anat Bremler-Barr, Yaron Koral:
Space efficient deep packet inspection of compressed web traffic. Comput. Commun. 35(7): 810-819 (2012) - [j11]Anat Bremler-Barr, Danny Hendler:
Space-Efficient TCAM-Based Classification Using Gray Coding. IEEE Trans. Computers 61(1): 18-30 (2012) - [j10]Anat Bremler-Barr, Yaron Koral:
Accelerating Multipattern Matching on Compressed HTTP Traffic. IEEE/ACM Trans. Netw. 20(3): 970-983 (2012) - [c31]Yehuda Afek, Anat Bremler-Barr, Yotam Harchol, David Hay, Yaron Koral:
MCA2: multi-core architecture for mitigating complexity attacks. ANCS 2012: 235-246 - [c30]Anat Bremler-Barr, Shimrit Tzur-David, David Hay, Yaron Koral:
Decompression-free inspection: DPI for shared dictionary compression over HTTP. INFOCOM 2012: 1987-1995 - [c29]Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy, Bernhard Plattner:
On the Vulnerability of Hardware Hash Tables to Sophisticated Attacks. Networking (1) 2012: 135-148 - 2011
- [c28]Anat Bremler-Barr, Yotam Harchol, David Hay:
Space-time tradeoffs in software-based deep Packet Inspection. HPSR 2011: 1-8 - [c27]Anat Bremler-Barr, Yaron Koral, Victor Zigdon:
Shift-based pattern matching for compressed web traffic. HPSR 2011: 222-229 - [c26]Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy, Bernhard Plattner:
On the vulnerability of the proportional fairness scheduler to retransmission attacks. INFOCOM 2011: 1431-1439 - [c25]Anat Bremler-Barr, Omer Dekel, Ran Goldschmidt, Hanoch Levy:
Controlling P2P Applications via Address Harvesting: The Skype Story. IPDPS Workshops 2011: 1579-1586 - [c24]Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy:
Network and computer performance in malicious environments: The good, the bad and the ugly. NetGCoop 2011: 1-5 - [c23]Yehuda Afek, Anat Bremler-Barr, Yaron Koral:
Efficient Processing of Multi-connection Compressed Web Traffic. Networking (1) 2011: 52-65 - [c22]Anat Bremler-Barr, Ran Goldschmidt:
On the Stability of Skype Super Nodes. TMA 2011: 86-99 - 2010
- [j9]Anat Bremler-Barr, David Hay, Danny Hendler, Ron M. Roth:
PEDS: A Parallel Error Detection Scheme for TCAM Devices. IEEE/ACM Trans. Netw. 18(5): 1665-1675 (2010) - [c21]Anat Bremler-Barr, David Hay, Yaron Koral:
CompactDFA: Generic State Machine Compression for Scalable Pattern Matching. INFOCOM 2010: 659-667 - [i1]Oded Argon, Anat Bremler-Barr, Osnat Mokryn, Dvir Schirman, Yuval Shavitt, Udi Weinsberg:
On the Dynamics of IP Address Allocation and Availability of End-Hosts. CoRR abs/1011.2324 (2010)
2000 – 2009
- 2009
- [j8]Anat Bremler-Barr, Nir Chen, Jussi Kangasharju, Osnat Mokryn, Yuval Shavitt:
Bringing order to BGP: Decreasing time and message complexity. Comput. Networks 53(12): 2241-2256 (2009) - [c20]Anat Bremler-Barr, Yaron Koral:
Accelerating Multi-Patterns Matching on Compressed HTTP Traffic. INFOCOM 2009: 397-405 - [c19]Anat Bremler-Barr, David Hay, Danny Hendler, Ron M. Roth:
PEDS: A Parallel Error Detection Scheme for TCAM Devices. INFOCOM 2009: 1296-1304 - [c18]Anat Bremler-Barr, David Hay, Danny Hendler:
Layered Interval Codes for TCAM-Based Classification. INFOCOM 2009: 1305-1313 - [c17]Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy:
On the Exploitation of CDF Based Wireless Scheduling. INFOCOM 2009: 2821-2825 - 2008
- [c16]Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy:
Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks. INFOCOM 2008: 2297-2305 - [c15]Anat Bremler-Barr, David Hay, Danny Hendler, Boris Farber:
Layered interval codes for tcam-based classification. SIGMETRICS 2008: 445-446 - 2007
- [j7]Anat Bremler-Barr, Nir Halachmi, Hanoch Levy:
Protecting bursty applications against traffic aggressiveness. Comput. Networks 51(13): 3864-3877 (2007) - [j6]Anat Bremler-Barr, Leah Epstein:
Path layout on tree networks: Bounds in different label switching models. Nord. J. Comput. 14(1-2): 109-125 (2007) - [c14]Anat Bremler-Barr, Danny Hendler:
Space-Efficient TCAM-Based Classification Using Gray Coding. INFOCOM 2007: 1388-1396 - [c13]Anat Bremler-Barr, Nir Chen, Jussi Kangasharju, Osnat Mokryn, Yuval Shavitt:
Bringing order to BGP: decreasing time and message complexity. PODC 2007: 368-369 - 2006
- [c12]Anat Bremler-Barr, Hanoch Levy, Nir Halachmi:
Protecting Bursty Applications Against Traffic Aggressiveness. IWQoS 2006: 272-273 - 2005
- [c11]Anat Bremler-Barr, Hanoch Levy:
Spoofing prevention method. INFOCOM 2005: 536-547 - 2004
- [j5]Yehuda Afek, Anat Bremler-Barr, Shemer Schwarz:
Improved BGP convergence via ghost flushing. IEEE J. Sel. Areas Commun. 22(10): 1933-1948 (2004) - [c10]Anat Bremler-Barr, Hanoch Levy:
Brief announcement: spoofing prevention method. PODC 2004: 375 - [c9]Anat Bremler-Barr, Leah Epstein:
Path Layout on Tree Networks: Bounds in Different Label Switching Models. SIROCCO 2004: 35-46 - 2003
- [j4]Anat Bremler-Barr, Edith Cohen, Haim Kaplan, Yishay Mansour:
Predicting and bypassing end-to-end Internet service degradations. IEEE J. Sel. Areas Commun. 21(6): 961-978 (2003) - [c8]Anat Bremler-Barr, Yehuda Afek, Shemer Schwarz:
Improved BGP Convergence via Ghost Flushing. INFOCOM 2003: 927-937 - 2002
- [j3]Yehuda Afek, Anat Bremler-Barr, Haim Kaplan, Edith Cohen, Michael Merritt:
Restoration by path concatenation: fast recovery of MPLS paths. Distributed Comput. 15(4): 273-283 (2002) - [c7]Yehuda Afek, Omer Ben-Shalom, Anat Bremler-Barr:
On the structure and application of BGP policy atoms. Internet Measurement Workshop 2002: 209-214 - [c6]Anat Bremler-Barr, Edith Cohen, Haim Kaplan, Yishay Mansour:
Predicting and bypassing end-to-end internet service degradations. Internet Measurement Workshop 2002: 307-320 - 2001
- [j2]Yehuda Afek, Anat Bremler-Barr, Sariel Har-Peled:
Routing with a clue. IEEE/ACM Trans. Netw. 9(6): 693-705 (2001) - [c5]Anat Bremler-Barr, Yehuda Afek, Haim Kaplan, Edith Cohen, Michael Merritt:
Restoration by path concatenation: fast recovery of MPLS paths. PODC 2001: 43-52 - [c4]Anat Bremler-Barr, Yehuda Afek, Haim Kaplan, Edith Cohen, Michael Merritt:
Restoration path concatenation: fast recovery of MPLS paths. SIGMETRICS/Performance 2001: 316-317 - 2000
- [c3]Yehuda Afek, Anat Bremler-Barr:
Trainet: A New Label Switching Scheme. INFOCOM 2000: 874-883
1990 – 1999
- 1999
- [c2]Anat Bremler-Barr, Yehuda Afek, Sariel Har-Peled:
Routing with a Clue. SIGCOMM 1999: 203-214 - 1998
- [j1]Yehuda Afek, Anat Bremler-Barr:
Self-Stabilizing Unidirectional Network Algorithms by Power Supply. Chic. J. Theor. Comput. Sci. 1998 (1998) - 1997
- [c1]Yehuda Afek, Anat Bremler-Barr:
Self-Stabilizing Unidirectional Network Algorithms by Power-Supply (Extended Abstract). SODA 1997: 111-120
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-04 20:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint