Author of the publication

Design and Implementation of FAITH, An Experimental System to Intercept and Manipulate Online Social Informatics.

, , , , , , and . ASONAM, page 195-202. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework., , , and . SEC, volume 193 of IFIP Conference Proceedings, page 369-384. Kluwer, (2001)A property oriented fault detection approach for link state routing protocol., , and . ICCCN, page 114-119. IEEE, (2000)Intrusion detection for link state routing protocol through integrated network management., , , and . ICCCN, page 634-639. IEEE, (1999)A Socially-Aware Operating System for Trustworthy Computing., , , , , and . ICSC, page 380-386. IEEE Computer Society, (2011)Leveraging Social Interactions to Suggest Friends., , , and . ICDCS Workshops, page 386-391. IEEE Computer Society, (2013)Malicious Packet Dropping: How It Might Impact the TCP Performance and How We Can Detect It., , , and . ICNP, page 263-272. IEEE Computer Society, (2000)The Evolution of Ego-Centric Triads: A Microscopic Approach toward Predicting Macroscopic Network Properties., , , and . SocialCom/PASSAT, page 172-179. IEEE Computer Society, (2011)A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network., , and . WISA, volume 3786 of Lecture Notes in Computer Science, page 96-107. Springer, (2005)Profiling Facebook Public Page Graph., , , , and . ICNC, page 161-165. IEEE Computer Society, (2018)On building the minimum number of tunnels: an ordered-split approach to manage IPSec/VPN policies., , and . NOMS (1), page 277-290. IEEE, (2004)