Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A reputation system for peer-to-peer networks., , and . NOSSDAV, page 144-152. ACM, (2003)Understanding and Reversing the Profit Model of Spam., , and . WEIS, (2005)Comparison of Control Structures for Fault Current Injection and Energy Balancing in MMC-HVDC., , , and . ISGT EUROPE, page 1-5. IEEE, (2023)Taxonomy of Email Reputation Systems., , and . ICDCS Workshops, page 27. IEEE Computer Society, (2007)Spam Sender Detection with Classification Modeling on Highly Imbalanced Mail Server Behavior Data., , , and . Artificial Intelligence and Pattern Recognition, page 174-180. ISRST, (2008)Fast and Effective Spam Sender Detection with Granular SVM on Highly Imbalanced Mail Server Behavior Data., , , and . CollaborateCom, IEEE Computer Society / ICST, (2006)CITADEL: a content protection architecture for decentralized peer-to-peer file sharing systems., and . GLOBECOM, page 1496-1500. IEEE, (2003)Gothic: A Group Access Control Architecture for Secure Multicast and Anycast., and . INFOCOM, page 1547-1556. IEEE Computer Society, (2002)VISOR: VoIP Security Using Reputation., and . ICC, page 1489-1493. IEEE, (2008)Analyzing Network and Content Characteristics of Spim Using Honeypots., , and . SRUTI, USENIX Association, (2007)