Author of the publication

TL;DR Hazard: A Comprehensive Study of Levelsquatting Scams.

, , , , , , , , , , , , and . SecureComm (2), volume 305 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 3-25. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Algorithms for Congestion Detection and Control., , , , and . GCC Workshops, volume 3252 of Lecture Notes in Computer Science, page 374-381. Springer, (2004)IABA: An improved PNN Algorithm for anomaly detection in network security management., , , and . ICNC, page 335-339. IEEE, (2010)ValCAT: Variable-Length Contextualized Adversarial Transformations Using Encoder-Decoder Language Model., , , , , and . NAACL-HLT, page 1735-1746. Association for Computational Linguistics, (2022)Measuring Privacy Threats in China-Wide Mobile Networks., , , , , and . FOCI @ USENIX Security Symposium, USENIX Association, (2018)Abusing CDNs for Fun and Profit: Security Issues in CDNs' Origin Validation., , , , , , , , , and . SRDS, page 1-10. IEEE Computer Society, (2018)An Admission Control Policy Based on Social Networks for P2P Systems., and . WAIM, page 487-492. IEEE Computer Society, (2008)Anomaly Internet Network Traffic Detection by Kernel Principle Component Classifier., , , , , , and . ISNN (3), volume 3498 of Lecture Notes in Computer Science, page 476-481. Springer, (2005)Who is answering my queries: understanding and characterizing interception of the DNS resolution path., , , , , , and . ANRW, page 15-16. ACM, (2019)XML Based X.509 Authorization in CERNET Grid., , , , and . GCC, volume 3251 of Lecture Notes in Computer Science, page 325-332. Springer, (2004)MAF-SAM: An effective method to perceive data plane threats of inter domain routing system., , , and . Comput. Networks, (2016)