From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Environment-Sensitive Intrusion Detection., , , , и . RAID, том 3858 из Lecture Notes in Computer Science, стр. 185-206. Springer, (2005)Understanding the Privacy Implications of ECS - (Extended Abstract)., , , , и . DIMVA, том 9721 из Lecture Notes in Computer Science, стр. 343-353. Springer, (2016)Beheading hydras: performing effective botnet takedowns., , , , и . ACM Conference on Computer and Communications Security, стр. 121-132. ACM, (2013)SinkMiner: Mining Botnet Sinkholes for Fun and Profit., , , и . LEET, USENIX Association, (2013)Recursive DNS Architectures and Vulnerability Implications., , , , , и . NDSS, The Internet Society, (2009)Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains., , , , , и . IEEE Symposium on Security and Privacy, стр. 691-706. IEEE Computer Society, (2016)Measuring lower bounds of the financial abuse to online advertisers: A four year case study of the TDSS/TDL4 Botnet., , , , , и . Comput. Secur., (2017)Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries., , , , и . ACM Conference on Computer and Communications Security, стр. 211-222. ACM, (2008)Protecting Secret Data from Insider Attacks., , и . Financial Cryptography, том 3570 из Lecture Notes in Computer Science, стр. 16-30. Springer, (2005)Large-scale DNS data analysis.. CCS, стр. 1054-1055. ACM, (2012)