D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 36 Citations 9,758 166 World Ranking 7001 National Ranking 3313

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • Operating system
  • The Internet

Peter Reiher mostly deals with Computer security, Denial-of-service attack, Application layer DDoS attack, Computer network and Trinoo. His Authorization study in the realm of Computer security interacts with subjects such as Insider, Monitoring system and Optimistic concurrency control. His Denial-of-service attack research is classified as research in The Internet.

Ddos defense is the focus of his Application layer DDoS attack research. His Computer network study which covers Distributed computing that intersects with Source routing, Virtual Router Redundancy Protocol, Network security and Next-generation network. Peter Reiher combines subjects such as Spoofing attack, Internet security and Service with his study of Trinoo.

His most cited work include:

  • A taxonomy of DDoS attack and DDoS defense mechanisms (1440 citations)
  • Attacking DDoS at the source (413 citations)
  • Saving portable computer battery power through remote process execution (260 citations)

What are the main themes of his work throughout his whole career to date?

Peter Reiher focuses on Computer security, Computer network, Distributed computing, The Internet and Denial-of-service attack. His work deals with themes such as Wireless, Ubiquitous computing, Software, Mobile computing and Botnet, which intersect with Computer security. His biological study spans a wide range of topics, including Overlay network, Software deployment and Vehicular ad hoc network.

His studies in Distributed computing integrate themes in fields like Service and Adaptation. His The Internet research is multidisciplinary, incorporating elements of Routing and Internet privacy. His Denial-of-service attack research incorporates themes from Testbed and Quality of service.

He most often published in these fields:

  • Computer security (31.14%)
  • Computer network (29.34%)
  • Distributed computing (22.16%)

What were the highlights of his more recent work (between 2011-2021)?

  • Computer security (31.14%)
  • The Internet (19.16%)
  • Computer network (29.34%)

In recent papers he was focusing on the following fields of study:

Computer security, The Internet, Computer network, Botnet and Wireless ad hoc network are his primary areas of study. His primary area of study in Computer security is in the field of Exploit. In general The Internet, his work in Denial-of-service attack and Internet service provider is often linked to Mechanism, Psychological resilience and Multi point linking many areas of study.

His Denial-of-service attack study is concerned with World Wide Web in general. His work in the fields of Node, Network packet, Routing and Spoofing attack overlaps with other areas such as Traffic congestion reconstruction with Kerner's three-phase theory. His work on Vehicular ad hoc network as part of general Wireless ad hoc network research is often related to Interference, thus linking different fields of science.

Between 2011 and 2021, his most popular works were:

  • Congestion Attacks to Autonomous Cars Using Vehicular Botnets (31 citations)
  • Drawbridge: software-defined DDoS-resistant traffic engineering (23 citations)
  • Obfuscation of sensitive human-perceptual output (20 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • Operating system
  • The Internet

His primary scientific interests are in Computer security, Computer network, Software, Vehicular ad hoc network and Botnet. His work carried out in the field of Computer network brings together such families of science as Transmission and The Internet. His research in The Internet is mostly concerned with Denial-of-service attack.

His Vehicular ad hoc network study incorporates themes from TCP tuning, Network congestion and Scalability. Peter Reiher interconnects Telecommunications, Control channel and Communications protocol in the investigation of issues within Botnet. The concepts of his Wireless ad hoc network study are interwoven with issues in Node, Sybil attack, Radio propagation and Global Positioning System.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

A taxonomy of DDoS attack and DDoS defense mechanisms

Jelena Mirkovic;Peter Reiher.
acm special interest group on data communication (2004)

2597 Citations

PARAID: a gear-shifting power-aware RAID

Charles Weddle;Mathew Oldham;Jin Qian;An-I Andy Wang.
file and storage technologies (2007)

678 Citations

Attacking DDoS at the source

J. Mirkovic;G. Prier;P. Reiher.
international conference on network protocols (2002)

637 Citations

Internet Denial of Service: Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)

Jelena Mirkovic;Sven Dietrich;David Dittrich;Peter Reiher.
(2004)

567 Citations

Saving portable computer battery power through remote process execution

Alexey Rudenko;Peter Reiher;Gerald J. Popek;Geoffrey H. Kuenning.
Mobile Computing and Communications Review (1998)

414 Citations

SAVE: source address validity enforcement protocol

Jun Li;J. Mirkovic;Mengqiu Wang;P. Reiher.
international conference on computer communications (2002)

363 Citations

Host-to-Host Congestion Control for TCP

Alexander Afanasyev;Neil Tilley;Peter Reiher;Leonard Kleinrock.
IEEE Communications Surveys and Tutorials (2010)

361 Citations

Resolving file conflicts in the Ficus file system

Peter Reiher;John Heidemann;David Ratner;Greg Skinner.
usenix summer technical conference (1994)

284 Citations

D-WARD: a source-end defense against flooding denial-of-service attacks

J. Mirkovic;P. Reiher.
IEEE Transactions on Dependable and Secure Computing (2005)

272 Citations

Detecting insider threats by monitoring system call activity

N. Nguyen;P. Reiher;G.H. Kuenning.
systems man and cybernetics (2003)

181 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Peter Reiher

Brij B. Gupta

Brij B. Gupta

Asia University Taiwan

Publications: 28

Masaru Kitsuregawa

Masaru Kitsuregawa

University of Tokyo

Publications: 19

Angelos D. Keromytis

Angelos D. Keromytis

Georgia Institute of Technology

Publications: 18

Dhruba K. Bhattacharyya

Dhruba K. Bhattacharyya

Tezpur University

Publications: 16

Jun Bi

Jun Bi

Tsinghua University

Publications: 16

Ethan L. Miller

Ethan L. Miller

University of California, Santa Cruz

Publications: 14

Yang Xiao

Yang Xiao

University of Alabama

Publications: 14

Douglas B. Terry

Douglas B. Terry

Amazon Web Services

Publications: 14

Richard M. Fujimoto

Richard M. Fujimoto

Georgia Institute of Technology

Publications: 14

Weisong Shi

Weisong Shi

Wayne State University

Publications: 14

Adrian Perrig

Adrian Perrig

ETH Zurich

Publications: 14

Xiao Qin

Xiao Qin

Auburn University

Publications: 14

Jugal Kalita

Jugal Kalita

University of Colorado Colorado Springs

Publications: 13

Marc Shapiro

Marc Shapiro

French Institute for Research in Computer Science and Automation - INRIA

Publications: 13

Geert Deconinck

Geert Deconinck

KU Leuven

Publications: 13

Mahadev Satyanarayanan

Mahadev Satyanarayanan

Carnegie Mellon University

Publications: 13

Trending Scientists

Torsten Schaub

Torsten Schaub

University of Potsdam

Xiaoli Li

Xiaoli Li

Agency for Science, Technology and Research

Max Q.-H. Meng

Max Q.-H. Meng

Chinese University of Hong Kong

Jianbin Xu

Jianbin Xu

Chinese University of Hong Kong

Glenys Thomson

Glenys Thomson

University of California, Berkeley

Anthony P. Clevenger

Anthony P. Clevenger

Montana State University

Susan K. Duckett

Susan K. Duckett

Clemson University

Michael Hawrylycz

Michael Hawrylycz

Allen Institute for Brain Science

Kenneth Lundstrom

Kenneth Lundstrom

Roche (Switzerland)

Walter R. Fehr

Walter R. Fehr

Iowa State University

Ingrid Meulenbelt

Ingrid Meulenbelt

Leiden University Medical Center

Brandon Dugan

Brandon Dugan

Colorado School of Mines

Nilton Curi

Nilton Curi

Federal University of Lavras

Linda-Gail Bekker

Linda-Gail Bekker

University of Cape Town

Stephen Jan

Stephen Jan

George Institute for Global Health (UK)

Gary Klein

Gary Klein

MacroCognition LLC

Something went wrong. Please try again later.