Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Breaking and fixing content-based filtering., , and . eCrime, page 52-56. IEEE, (2017)Case Study: Romance Scams., and . Understanding Social Engineering Based Scams, Springer, (2016)Understanding Domain Registration Abuses., , , , and . SEC, volume 330 of IFIP Advances in Information and Communication Technology, page 68-79. Springer, (2010)Sherlock Holmes and the Case of the Advanced Persistent Threat., and . LEET, USENIX Association, (2012)Fast and versatile algorithm for nearest neighbor search based on a lower bound tree., , , and . Pattern Recognit., 40 (2): 360-375 (2007)Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks., , , , , , and . ACSAC, page 199-208. ACM, (2013)Revisiting Botnet Models and Their Implications for Takedown Strategies., and . POST, volume 7215 of Lecture Notes in Computer Science, page 249-268. Springer, (2012)Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data., , , , and . CoRR, (2014)Host Fingerprinting and Tracking on the Web: Privacy and Security Implications., , , , and . NDSS, The Internet Society, (2012)Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data., , , , and . DSN, page 45-56. IEEE Computer Society, (2015)