Shir Landau Feibish, Yehuda Afek, Anat Bremler-Barr, Edith Cohen, Michal Shagam, "Mitigating DNS random subdomain DDoS attacks by distinct heavy Hitters sketches". HotWeb 2017 [technical report ][abstract]
Yehuda Afek, Anat Bremler-Barr, Shir Landau Feibish, Liron Schieff, "Detecting Heavy Flows in the SDN Match and Action Model", Computer Networks 2018
Anat Bremler-Barr, Yotam Harchol, David Hay, Yacov Hel-Or, "Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications". Accepted to IEEE/ACM Transactions on Networking (January 2018)
A. Bremler-Barr, D. Hay and Y. Koral, “ CompactDFA: Scalable Pattern Matching using Longest Prefix Match solution ", accepted to IEEE/ACM Transaction on Networking, 2013
U. Ben-Porat, A. Bremler-Barr, H. Levy , “ On the Exploitation of CDF based Wireless Scheduling ", accepted to special issue on cyber security science of Computer Networks 2012
A. Breml1er-Barr, D. Hay, D. Hendler, “ Layered Interval Codes for TCAM-based Classification ", Computer Networks, special issue on Challenges in High-Performance Switching and Routing in the Future Internet,56(13):3023-3039, 72012.
Y.Afek, A. Bremler-Barr, Y. Koral , “ Space Efficient Deep Packet Inspection of Compressed Web Traffic ", Computer Communication, 35(7): 810-819, 2012
U. Ben-Porat, A. Bremler-Barr, H. Levy “ Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks ", IEEE Transactions on Computers 2012
A. Bremler-Barr, Y. Koral , “ Accelerating Multi-patterns Matching on Compressed HTTP Traffic ", IEEE/ACM Transactions on Networking, 20(3): 970-983, 2012
A. Bremler-Barr, D. Hendler “Space-Efficient TCAM-based Classification Using Gray Coding ", IEEE Transactions on Computers, 61(1): 18-30, 2012
A. Bremler-Barr, D. Hay, D. Hendler, R. Roth, “PEDS: A Parallel Error Detection Scheme for TCAM Devices ”, IEEE/ACM Transactions on Networking, 18(5): 1665-1675 2010
A. Bremler–Barr , O. Mokryn, J. Kangasharju, N. Chen and Y. Shavitt“ “Bringing Order To BGP: Decreasing Convergence Message Complexity ” , Journal of computer Networks, 53(12): 2241-2256, August 2009
A. Bremler-Barr and L. Epstein “ Path layout on tree networks: Bounds in different label switching models " , Nord. J. Comput. 14(1-2): 109-125, 2007
A. Bremler-Barr, H. Levy and N. Halachmi, “Protecting Bursty Applications Against Traffic Aggressiveness ”, in Computer Networks 2007, Volume 51 , Issue 13:3864-3877, 2007
A. Bremler-Barr, Y. Afek, and S. Schwarts, “ Improved BGP Convergence via Ghost Flushing ”, IEEE Journal on Selected Areas in Communications, 22(10): 1933-1948, 2004.
A. Bremler-Barr, E. Cohen, H. Kaplan, and Y. Mansour, “On the predictability and by-passability of end to end delays ”, IEEE Journal on Selected Areas in Communications, 21(6): 961-978 2003
A. Bremler-Barr, Y.Afek, H.Kaplan, E. Cohen, and M. Merrit, “Restoration by Path Concatenation: Fast recovery of MPLS paths ”, Special Issue of Distributed Computing, 15:273-283. 2002.
Y. Afek and A. Bremler and S.Har-Peled, “Routing with a clue” IEEE/ACM Transactions on Networking, vol. 9 pp. 693-705. Dec. 2001.
Y. Afek and A. Bremler, “ Self-Stabilizing Unidirectional Network Algorithms by Power Supply ”. In Special Issue for Self-stabilizing, Chicago Journel of Theoretical Computer Science, Dec. 1998
Y. Afek and A. Bremler-Barr and S. Schwartz “Explicit Edge Withdrawal in BGP” (Shemer Schwartz, thesis manuscript) 2003
A. Bremler-Barr, Y. Mansour, and Y. Rosenbaum, " "Towards automatic root cause analysis of connection degradation" " (Y. Rosenbum, thesis manuscript) 2005.
Udi Ben-Porat1, Anat Bremler-Barr, Hanoch Levy, and Bernhard Plattner, “ On the Vulnerability of Hardware Hash Tables to Sophisticated Attacks ” Technical Report 2012
Y. Afek, A. Bremler-Barr, S. Har-Peled “Method for fast IP-lookup - routing with a clue”, United States Patent Application 6876655, 2005
Y. Afek, A. Bremler-Barr, S. Har-Peled, “Method for Fast Multi-Dimensional Packet Classification”, United States Patent Application 6,633,860, 2003
Yehuda Afek, Anat Bremler-Barr, Dan Touitou, Methods and apparatus for protecting against overload conditions on nodes of a distributed network, United States Patent Application 20020083175, 2002 .
Anat Bremler-Barr, Keren Horvitz, Dan Touitou, Rafi Tzadikario, Yehuda Afek, Weighted fair queuing-based methods and apparatus for protecting against overload conditions on nodes of a distributed network, United States Patent Application 20030076848, 2003.
Guy Pazi, Anat Bremler-Barr, Rami Rivlin, Dan Touitou, Protecting against distributed denial of service attacks (PCT/IL02/00714, 10/232,993) , United States Patent Application 20030076848, 2003.
Anat Bremler-Barr, Touitou Dan, Rafi Zadikario, Yehuda Afek, Protecting against malicious traffic (PCT/IL02/00996) submitted 2002.
Rafi Zadikario, Dan Touitou, Anat Bremler-Barr, Protecting against and stopping the spread of malicious worm traffic on the Internet, (60/445,605) submitted 2003
Anat Bremler-Barr, Dan Touitou, Rami Rivlin, Detecting and protecting against worm traffic on a network, United States Patent Application 20030076848, 2005
Anat Bremler-Bar, Hank Nussbacher, Roi Hermoni, Selective diversion and injection of communication traffic, United States Patent Application 20030076848, 2006.
Anat Bremler-Barr, O. Dekel, H. Levy, "Detecting and controlling peer-to-peer traffic", PCT 2008
Anat Bremler-Barr, David Hay, Danny Hendler and Ron M. Roth. “TCAM with Fast Error Detection”. U.S. Provisional Patent Application No. 61/130,129. May 2008
Anat Bremler-Barr, and Y. Koral "Accelerating Multi-patterns Matching on Compressed HTTP Traffic" Provisional Patent 2009
Anat Bremler-Barr, David Hay and Yaron Koral "CompactDFA: "CompactDFA: Generic State Machine Compression for Scalable Pattern Matching", Provisional Patent 2010