A unified algorithm for accelerating edit-distance computation via text-compression D Hermelin, GM Landau, S Landau, O Weimann arXiv preprint arXiv:0902.2649, 2009 | 60 | 2009 |

Sampling and large flow detection in SDN Y Afek, A Bremler-Barr, S Landau Feibish, L Schiff Proceedings of the 2015 ACM Conference on Special Interest Group on Data …, 2015 | 38 | 2015 |

Detecting heavy flows in the SDN match and action model Y Afek, A Bremler-Barr, SL Feibish, L Schiff Computer Networks 136, 1-12, 2018 | 31 | 2018 |

A simpler analysis of Burrows–Wheeler-based compression H Kaplan, S Landau, E Verbin Theoretical Computer Science 387 (3), 220-235, 2007 | 30 | 2007 |

Distributed computing building blocks for rational agents Y Afek, Y Ginzberg, S Landau Feibish, M Sulamy Proceedings of the 2014 ACM symposium on Principles of distributed computing …, 2014 | 22 | 2014 |

Catching the microburst culprits with snappy X Chen, SL Feibish, Y Koral, J Rexford, O Rottenstreich Proceedings of the Afternoon Workshop on Self-Driving Networks, 22-28, 2018 | 20 | 2018 |

A simpler analysis of burrows-wheeler based compression H Kaplan, S Landau, E Verbin Annual Symposium on Combinatorial Pattern Matching, 282-293, 2006 | 19 | 2006 |

Unified compression-based acceleration of edit-distance computation D Hermelin, GM Landau, S Landau, O Weimann Algorithmica 65 (2), 339-353, 2013 | 18 | 2013 |

Generalized substring compression O Keller, T Kopelowitz, SL Feibish, M Lewenstein Theoretical Computer Science 525, 42-54, 2014 | 15 | 2014 |

Network-wide routing-oblivious heavy hitters RB Basat, G Einziger, SL Feibish, J Moraney, D Raz Proceedings of the 2018 Symposium on Architectures for Networking and …, 2018 | 12 | 2018 |

Automated signature extraction for high volume attacks Y Afek, A Bremler-Barr, SL Feibish Architectures for Networking and Communications Systems, 147-156, 2013 | 12 | 2013 |

Generalized substring compression O Keller, T Kopelowitz, S Landau, M Lewenstein Annual Symposium on Combinatorial Pattern Matching, 26-38, 2009 | 12 | 2009 |

Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters sketches SL Feibish, Y Afek, A Bremler-Barr, E Cohen, M Shagam Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and …, 2017 | 10 | 2017 |

Fine-grained queue measurement in the data plane X Chen, SL Feibish, Y Koral, J Rexford, O Rottenstreich, SA Monetti, ... Proceedings of the 15th International Conference on Emerging Networking …, 2019 | 8 | 2019 |

Zero-day signature extraction for high-volume attacks Y Afek, A Bremler-Barr, SL Feibish IEEE/ACM Transactions on Networking 27 (2), 691-706, 2019 | 7 | 2019 |

Combinatorial Pattern Matching M Lewenstein, G Valiente Springer Berlin/Heidelberg., 2006 | 7 | 2006 |

Efficient distinct heavy hitters for DNS DDoS attack detection Y Afek, A Bremler-Barr, E Cohen, SL Feibish, M Shagam arXiv preprint arXiv:1612.02636, 2016 | 5 | 2016 |

Routing Oblivious Measurement Analytics RB Basat, X Chen, G Einziger, SL Feibish, D Raz, M Yu arXiv preprint arXiv:2005.11542, 2020 | 3 | 2020 |

Carpe Elephants: Seize the Global Heavy Hitters R Harrison, SL Feibish, A Gupta, R Teixeira, S Muthukrishnan, J Rexford Proceedings of the Workshop on Secure Programmable Network Infrastructure, 15-21, 2020 | | 2020 |

BeauCoup: Answering Many Network Traffic Queries, One Memory Update at a Time X Chen, S Landau-Feibish, M Braverman, J Rexford Proceedings of the Annual conference of the ACM Special Interest Group on …, 2020 | | 2020 |