From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Potential of Proactive Domain Blacklisting., , и . LEET, USENIX Association, (2010)Design and Implementation of Netdude, a Framework for Packet Trace Manipulation (Awarded Best Student Paper!).. USENIX ATC, FREENIX Track, стр. 63-72. USENIX, (2004)Priceless: the role of payments in abuse-advertised goods., , , , и . CCS, стр. 845-856. ACM, (2012)Efficient sequence alignment of network traffic., и . Internet Measurement Conference, стр. 307-312. ACM, (2006)Prudent Practices for Designing Malware Experiments: Status Quo and Outlook., , , , , , , и . IEEE Symposium on Security and Privacy, стр. 65-79. IEEE Computer Society, (2012)Netalyzr: illuminating the edge network., , , и . Internet Measurement Conference, стр. 246-259. ACM, (2010)A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems., , , и . DIMVA, том 5137 из Lecture Notes in Computer Science, стр. 267-278. Springer, (2008)What's Clicking What? Techniques and Innovations of Today's Clickbots., , , , и . DIMVA, том 6739 из Lecture Notes in Computer Science, стр. 164-183. Springer, (2011)Understanding the domain registration behavior of spammers., , , , , , и . Internet Measurement Conference, стр. 63-76. ACM, (2013)Experiences from Netalyzr with engaging users in end-system measurement., , , , и . W-MUST@SIGCOMM, стр. 25-30. ACM, (2011)