From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Case Study: Romance Scams., и . Understanding Social Engineering Based Scams, Springer, (2016)Sherlock Holmes and the Case of the Advanced Persistent Threat., и . LEET, USENIX Association, (2012)Understanding Domain Registration Abuses., , , , и . SEC, том 330 из IFIP Advances in Information and Communication Technology, стр. 68-79. Springer, (2010)Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks., , , , , , и . ACSAC, стр. 199-208. ACM, (2013)Breaking and fixing content-based filtering., , и . eCrime, стр. 52-56. IEEE, (2017)Fast and versatile algorithm for nearest neighbor search based on a lower bound tree., , , и . Pattern Recognit., 40 (2): 360-375 (2007)Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data., , , , и . DSN, стр. 45-56. IEEE Computer Society, (2015)Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data., , , , и . CoRR, (2014)Revisiting Botnet Models and Their Implications for Takedown Strategies., и . POST, том 7215 из Lecture Notes in Computer Science, стр. 249-268. Springer, (2012)Host Fingerprinting and Tracking on the Web: Privacy and Security Implications., , , , и . NDSS, The Internet Society, (2012)