Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IoT Traffic Flow Identification using Locality Sensitive Hashes., and . ICC, page 1-6. IEEE, (2020)An analysis of friend circles of Facebook users., , and . LCN Workshops, page 680-686. IEEE Computer Society, (2015)ATMOS - A Data Collection and Presentation Toolkit for the Nevada Climate Change Portal., , and . ICSOFT, page 206-213. SciTePress, (2013)Operating system fingerprinting via automated network traffic analysis., , and . CEC, page 2502-2509. IEEE, (2017)Network Analysis of Software Repositories: Identifying Subject Matter Experts., , and . CompleNet, volume 424 of Studies in Computational Intelligence, page 187-198. Springer, (2012)Network management game., , and . LANMAN, page 1-6. IEEE, (2011)Analysis of academic ties: A case study of Mathematics Genealogy., , and . GLOBECOM Workshops, page 125-129. IEEE, (2011)Mapping Emerging News Networks: A Case Study of the San Francisco Bay Area., , , and . CompleNet, volume 424 of Studies in Computational Intelligence, page 237-244. Springer, (2012)Resolving Anonymous Routers in Internet Topology Measurement Studies., and . INFOCOM, page 1076-1084. IEEE, (2008)How to Find Hidden Users: A Survey of Attacks on Anonymity Networks., , and . IEEE Commun. Surv. Tutorials, 17 (4): 2296-2316 (2015)