Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Still Beheading Hydras: Botnet Takedowns Then and Now., , and . IEEE Trans. Dependable Secur. Comput., 14 (5): 535-549 (2017)SURF: detecting and measuring search poisoning., , and . ACM Conference on Computer and Communications Security, page 467-476. ACM, (2011)Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis., , and . IEEE Trans. Dependable Secur. Comput., 9 (5): 714-726 (2012)Real-Time Detection of Malware Downloads via Large-Scale URL->File->Machine Graph Mining., , and . AsiaCCS, page 783-794. ACM, (2016)Towards Measuring the Effectiveness of Telephony Blacklists., , , and . NDSS, The Internet Society, (2018)Network Intrusion Detection by Combining One-Class Classifiers., , and . ICIAP, volume 3617 of Lecture Notes in Computer Science, page 58-65. Springer, (2005)VAMO: towards a fully automated malware clustering validity analysis., and . ACSAC, page 329-338. ACM, (2012)Discovering and Measuring CDNs Prone to Domain Fronting., , , and . WWW, page 1859-1867. ACM, (2024)Understanding the prevalence and use of alternative plans in malware with network games., , , and . ACSAC, page 1-10. ACM, (2011)Beheading hydras: performing effective botnet takedowns., , , , and . ACM Conference on Computer and Communications Security, page 121-132. ACM, (2013)