Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast and versatile algorithm for nearest neighbor search based on a lower bound tree., , , and . Pattern Recognit., 40 (2): 360-375 (2007)Sherlock Holmes and the Case of the Advanced Persistent Threat., and . LEET, USENIX Association, (2012)Understanding Domain Registration Abuses., , , , and . SEC, volume 330 of IFIP Advances in Information and Communication Technology, page 68-79. Springer, (2010)Case Study: Romance Scams., and . Understanding Social Engineering Based Scams, Springer, (2016)Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks., , , , , , and . ACSAC, page 199-208. ACM, (2013)Breaking and fixing content-based filtering., , and . eCrime, page 52-56. IEEE, (2017)Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data., , , , and . DSN, page 45-56. IEEE Computer Society, (2015)Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data., , , , and . CoRR, (2014)Revisiting Botnet Models and Their Implications for Takedown Strategies., and . POST, volume 7215 of Lecture Notes in Computer Science, page 249-268. Springer, (2012)Host Fingerprinting and Tracking on the Web: Privacy and Security Implications., , , , and . NDSS, The Internet Society, (2012)