Author of the publication

Peeking behind the great firewall: Privacy on Chinese file sharing networks.

, and . PST, page 650-656. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Maximum Degree & Diameter-Bounded Subgraph and its Applications., , , and . J. Math. Model. Algorithms, 11 (3): 249-268 (2012)REPLOT: REtrieving Profile Links On Twitter for malicious campaign discovery., , , , and . AI Commun., 29 (1): 107-122 (2016)Human-centered strategies for cyber-physical systems security., , and . EAI Endorsed Trans. Security Safety, 4 (14): e5 (2018)A methodology for estimating the tangible cost of data breaches., and . J. Inf. Secur. Appl., 19 (6): 321-330 (2014)Automatically determining phishing campaigns using the USCAP methodology., , and . eCrime, page 1-8. IEEE, (2010)Determining provenance in phishing websites using automated conceptual analysis., and . eCrime, page 1-7. IEEE, (2009)Rapid Anomaly Detection Using Integrated Prudence Analysis (IPA)., , , and . PAKDD (Workshops), volume 11154 of Lecture Notes in Computer Science, page 137-141. Springer, (2018)Modelling the Efficacy of Auto-Internet Warnings to Reduce Demand for Child Exploitation Materials.. PAKDD (Workshops), volume 11154 of Lecture Notes in Computer Science, page 318-329. Springer, (2018)Young people, child pornography, and subcultural norms on the Internet., , , and . J. Assoc. Inf. Sci. Technol., 64 (5): 992-1000 (2013)Controlling information behaviour: the case for access control., and . Behav. Inf. Technol., 35 (4): 268-276 (2016)