Signal stability-based adaptive routing (SSA) for ad hoc mobile networks R Dube, CD Rais, KY Wang, SK Tripathi IEEE Personal communications 4 (1), 36-45, 1997 | 1564 | 1997 |
Routing stability in congested networks: Experimentation and analysis A Shaikh, A Varma, L Kalampoukas, R Dube ACM SIGCOMM Computer Communication Review 30 (4), 163-174, 2000 | 141 | 2000 |
A comparison of scaling techniques for BGP R Dube ACM SIGCOMM Computer Communication Review 29 (3), 44-46, 1999 | 64 | 1999 |
Avoiding instability during graceful shutdown of OSPF A Shaikh, R Dube, A Varma Proceedings. Twenty-First Annual Joint Conference of the IEEE Computer and …, 2002 | 39 | 2002 |
Improving NFS performance over wireless links R Dube, CD Rais, SK Tripathi IEEE Transactions on Computers 46 (3), 290-298, 1997 | 37 | 1997 |
Avoiding instability during graceful shutdown of multiple OSPF routers A Shaikh, R Dube, A Varma IEEE/ACM Transactions on Networking 14 (3), 532-542, 2006 | 26 | 2006 |
BGP scaling techniques revisited JG Scudder, R Dube ACM SIGCOMM Computer Communication Review 29 (5), 22-23, 1999 | 13 | 1999 |
Route reflection considered harmful R Dube, JG Scudder Internet Engineering Task Force Internet Draft, 1998 | 13 | 1998 |
A Comparison of the Memory Management sub-systems in FreeBSD and Linux R Dube Digital Repository at the University of Maryland, 1998 | 10 | 1998 |
Faulty use of the CIC-IDS 2017 dataset in information security research R Dube Journal of Computer Virology and Hacking Techniques, 2023 | 4 | 2023 |
Huawei’s role in Chinese espionage and information operations R Dube http://dx.doi.org/10.13140/RG.2.2.35835.18724, 2022 | 4 | 2022 |
Large Language Models in Information Security Research: A January 2024 Survey R Dube http://dx.doi.org/10.13140/RG.2.2.20107.26404, 2024 | 3 | 2024 |
Understanding the Communist Party of China's Information Operations R Dube https://www.researchgate.net/publication …, 2021 | 2 | 2021 |
The Intersection of Large Language Models and Business Email Compromise: What We Know So Far R Dube http://dx.doi.org/10.13140/RG.2.2.27907.72480, 2024 | 1 | 2024 |
Building a Business Email Compromise Research Dataset R Dube | | 2024 |
Huawei's business ethics and privacy violations in Pakistan; But spying too? R Dube http://dx.doi.org/10.13140/RG.2.2.11877.47849, 2023 | | 2023 |
Huawei's trajectory in India - crippled by the Chinese military R Dube http://dx.doi.org/10.13140/RG.2.2.28208.23047, 2023 | | 2023 |
(Mis)use of the CICIDS 2017 Dataset in Information Security Research R Dube http://dx.doi.org/10.13140/RG.2.2.25435.64809, 2022 | | 2022 |
Scalable hierarchical coarse-grained timers R Dube ACM SIGOPS Operating Systems Review 34 (1), 11-20, 2000 | | 2000 |
Reducing Router-Crossings in a Mobile Intranet R Dube, I Korpeoglu, SK Tripathi | | 1998 |