Follow
Jhonatan Tavori
Title
Cited by
Cited by
Year
Stochastic epidemic spreading: not all super-spreading processes are born equal, neither all lockdown strategies
J Tavori, H Levy
Stochastic Models 40 (1), 38-69, 2024
4*2024
Tornadoes in the cloud: Worst-case attacks on distributed resources systems
J Tavori, H Levy
IEEE INFOCOM 2021-IEEE Conference on Computer Communications, 1-10, 2021
42021
Continual Versus Occasional Spreading In Networks: Modeling Spreading Thresholds In Epidemic Processes
J Tavori, H Levy
ACM SIGMETRICS Performance Evaluation Review 49 (2), 9-11, 2022
32022
How to Attack and Congest Delay-Sensitive Applications on the Cloud
J Tavori, H Levy
IEEE INFOCOM 2023-IEEE Conference on Computer Communications, 1-10, 2023
12023
On the Convexity of the Effective Reproduction Number
J Tavori, H Levy
Journal of Computational Biology, 2023
12023
Worst Case Attacks on Distributed Resources Systems
H Levy, J Tavori
ACM SIGMETRICS Performance Evaluation Review 48 (2), 9-11, 2020
12020
How to Attack and Congest a Network? Worst-Case Link-Targeted DDoS Attacks
J Tavori, H Levy
Companion of the 19th International Conference on emerging Networking …, 2023
2023
The Cost of Retrying: Exploiting Retry-Mechanisms in Cloud Applications by DDoS Attacks
J Tavori, A Bremler-Barr, H Levy
Companion of the 19th International Conference on emerging Networking …, 2023
2023
Resilience of Networks to Spreading Computer Viruses: Optimal Anti-Virus Deployment
J Tavori, H Levy
NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium, 1-5, 2023
2023
Queueing-Network Based Applications Under Worst-case Attacks
J Tavori, H Levy
ACM SIGMETRICS Performance Evaluation Review 50 (2), 15-17, 2022
2022
A Queueing Approach for Vehicular Traffic Networks Sybil Attacks
J Tavori, H Levy
31st USENIX Security Symposium Poster Session (USENIX Security 22), 2022
2022
Super-Spreaders Out, Super-Spreading In: The Effects of Infectiousness Heterogeneity and Lockdowns on Herd Immunity (preprint)
J Tavori, H Levy
2021
Exploiting Miscoordination of Microservices in Tandem for Effective DDoS Attacks
A Bremler-Barr, M Czeizler, H Levy, J Tavori
The system can't perform the operation now. Try again later.
Articles 1–13