Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

fFTP: a fast file transfer protocol for home N-screen platform., , , and . Personal and Ubiquitous Computing, 22 (1): 143-152 (2018)Scam Pandemic: How Attackers Exploit Public Fear through Phishing., , , , , , , , , and 2 other author(s). CoRR, (2021)Adaptive video streaming over HTTP., , and . ACM Southeast Regional Conference, page 26:1-26:3. ACM, (2014)Analyzing Spatial Differences in the TLS Security of Delegated Web Services., , , , and . AsiaCCS, page 475-487. ACM, (2021)An Adaptive Primary Path Switching Scheme for Seamless mSCTP Handover., , , and . Smart Comput. Rev., 1 (2): 150-160 (2011)Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers., , , , , , , , , and . CSET @ USENIX Security Symposium, USENIX Association, (2017)Hiding Critical Program Components via Ambiguous Translation., , , , , , and . ICSE, page 1120-1132. ACM, (2022)Certified Malware in South Korea: A Localized Study of Breaches of Trust in Code-Signing PKI Ecosystem., , , and . ICICS (1), volume 12918 of Lecture Notes in Computer Science, page 59-77. Springer, (2021)Understanding of Adversary Behavior and Security Threats in Public Key Infrastructures.. University of Maryland, College Park, MD, USA, (2020)base-search.net (ftunivmaryland:oai:drum.lib.umd.edu:1903/26109).Poisoned ChatGPT Finds Work for Idle Hands: Exploring Developers' Coding Practices with Insecure Suggestions from Poisoned AI Models., , , , and . CoRR, (2023)