Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Empirical Study of Malicious Threads in Security Forums., , , and . WWW (Companion Volume), page 176-182. ACM, (2019)Multiband Media Access Control in Impulse-Based UWB Ad Hoc Networks., , , , and . IEEE Trans. Mob. Comput., 6 (4): 351-366 (2007)Which phone will you get next: Observing trends and predicting the choice., , , , , and . NOMS, page 1-7. IEEE, (2014)Inferring cellular user demographic information using homophily on call graphs., , and . INFOCOM, page 3363-3368. IEEE, (2013)On the usage patterns of multimodal communication: Countries and evolution., , and . INFOCOM, page 3135-3140. IEEE, (2013)Link Positions Matter: A Noncommutative Routing Metric for Wireless Mesh Network., , , , and . INFOCOM, page 744-752. IEEE, (2008)Sampling Internet Topologies: How Small Can We Go?, , , and . International Conference on Internet Computing, page 577-580. CSREA Press, (2003)Detecting malware with graph-based methods: traffic classification, botnets, and facebook scams.. WWW (Companion Volume), page 495-496. International World Wide Web Conferences Steering Committee / ACM, (2013)Virus Propagation on Time-Varying Networks: Theory and Immunization Algorithms., , , , and . ECML/PKDD (3), volume 6323 of Lecture Notes in Computer Science, page 99-114. Springer, (2010)Threshold conditions for arbitrary cascade models on arbitrary networks., , , , and . Knowl. Inf. Syst., 33 (3): 549-575 (2012)