From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position., , , , и . NSS, том 9408 из Lecture Notes in Computer Science, стр. 46-59. Springer, (2015)Obsidian: A scalable and efficient framework for NetFlow obfuscation., , , , и . INFOCOM, стр. 7-8. IEEE, (2013)Large-Scale Traffic Anomaly Detection: Analysis of Real Netflow Datasets., , , , и . ICETE (Selected Papers), том 455 из Communications in Computer and Information Science, стр. 192-208. Springer, (2012)Bypassing Censorship: A Proven Tool against the Recent Internet Censorship in Turkey., , , , и . ISSRE Workshops, стр. 389-394. IEEE Computer Society, (2014)DDoS Detection with Information Theory Metrics and Netflows - A Real Case., , , , и . SECRYPT, стр. 172-181. SciTePress, (2012)MhRep: Multi-hop Replication Scheme for Data Survival in Unattended Wireless Sensor Networks., , , и . SRDS Workshops, стр. 42-51. IEEE Computer Society, (2011)Obfuscation of sensitive data in network flows., , , , и . INFOCOM, стр. 2372-2380. IEEE, (2012)Mapping the File Systems Genome: rationales, technique, results and applications., , , и . CoRR, (2013)Relieve Internet Routing Security of Public Key Infrastructure., , , , и . ICCCN, стр. 1-9. IEEE, (2012)Uniqueness of the file systems genome: Supporting arguments and massive experimental measurements., , , и . CRiSIS, стр. 1-8. IEEE Computer Society, (2013)