Author of the publication

Drops for Stuff: An Analysis of Reshipping Mule Scams.

, , , , , , , and . ACM Conference on Computer and Communications Security, page 1081-1092. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient and Density-Aware Routing for Wireless Sensor Networks., , , and . ICCCN, page 207-212. IEEE, (2006)Sliding Mode Control for a Surgical Teleoperation System via a Disturbance Observer., , and . IEEE Access, (2019)Higher Order Support Vector Random Fields for Hyperspectral Image Classification., , , and . ISPRS Int. J. Geo Inf., 7 (1): 19 (2018)Using Trust for Restricted Delegation in Grid Environments., , , and . ISPEC, volume 3439 of Lecture Notes in Computer Science, page 293-301. Springer, (2005)TL;DR Hazard: A Comprehensive Study of Levelsquatting Scams., , , , , , , , , and 3 other author(s). SecureComm (2), volume 305 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 3-25. Springer, (2019)Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks., , , , , , , , , and 1 other author(s). CoRR, (2020)Joint Relay Selection and Resource Allocation for Delay-Sensitive Traffic in Multi-Hop Relay Networks., , , and . KSII Trans. Internet Inf. Syst., 16 (9): 3008-3028 (2022)MassJoin: A mapreduce-based method for scalable string similarity joins., , , , and . ICDE, page 340-351. IEEE Computer Society, (2014)Imputation of Missing Values in Training Data using Variational Autoencoder., and . ICDEW, page 49-54. IEEE, (2023)CDN Judo: Breaking the CDN DoS Protection with Itself., , , , , , , , and . NDSS, The Internet Society, (2020)