From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Understanding the Privacy Implications of ECS - (Extended Abstract)., , , , и . DIMVA, том 9721 из Lecture Notes in Computer Science, стр. 343-353. Springer, (2016)Environment-Sensitive Intrusion Detection., , , , и . RAID, том 3858 из Lecture Notes in Computer Science, стр. 185-206. Springer, (2005)Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains., , , , , и . IEEE Symposium on Security and Privacy, стр. 691-706. IEEE Computer Society, (2016)Protecting Secret Data from Insider Attacks., , и . Financial Cryptography, том 3570 из Lecture Notes in Computer Science, стр. 16-30. Springer, (2005)Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries., , , , и . ACM Conference on Computer and Communications Security, стр. 211-222. ACM, (2008)SinkMiner: Mining Botnet Sinkholes for Fun and Profit., , , и . LEET, USENIX Association, (2013)Recursive DNS Architectures and Vulnerability Implications., , , , , и . NDSS, The Internet Society, (2009)Beheading hydras: performing effective botnet takedowns., , , , и . ACM Conference on Computer and Communications Security, стр. 121-132. ACM, (2013)Towards complete node enumeration in a peer-to-peer botnet., , , , , , , , , и 1 other автор(ы). AsiaCCS, стр. 23-34. ACM, (2009)Impeding Individual User Profiling in Shopper Loyalty Programs., , и . Financial Cryptography, том 7035 из Lecture Notes in Computer Science, стр. 93-101. Springer, (2011)