Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection., , , , , and . IEEE Trans. Software Eng., 41 (9): 925-943 (2015)The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense., , , , , and . IJDSN, 2 (3): 267-287 (2006)Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection., , , and . INFOCOM, page 2089-2097. IEEE, (2019)A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses., , , , and . INFOCOM, page 2455-2463. IEEE, (2009)Routing in Socially Selfish Delay Tolerant Networks., , and . INFOCOM, page 857-865. IEEE, (2010)SET: Detecting node clones in sensor networks., , and . SecureComm, page 341-350. IEEE, (2007)Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification., and . ACM Trans. Inf. Syst. Secur., 11 (3): 15:1-15:30 (2008)On the Effectiveness of Internal Patching Against File-Sharing Worms., , and . ACNS, volume 5037 of Lecture Notes in Computer Science, page 1-20. (2008)Toward A Network-Assisted Approach for Effective Ransomware Detection., , , , and . EAI Endorsed Trans. Security Safety, 7 (24): e3 (2021)Recomposition vs. Prediction: A Novel Anomaly Detection for Discrete Events Based On Autoencoder., , and . CoRR, (2020)