Author of the publication

A large scale exploratory analysis of software vulnerability life cycles.

, , and . ICSE, page 771-781. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots., , , , and . Internet Measurement Conference, page 129-136. ACM, (2014)Who are you talking to? Breaching privacy in encrypted IM networks., , , and . ICNP, page 1-10. IEEE Computer Society, (2013)Malware Slums: Measurement and Analysis of Malware on Traffic Exchanges., , , , , and . DSN, page 572-582. IEEE Computer Society, (2016)A distributed and privacy preserving algorithm for identifying information hubs in social networks., , , and . INFOCOM, page 561-565. IEEE, (2011)Modeling Morphology of Social Network Cascades, and . CoRR, (2013)Understanding the impact of network dynamics on mobile video user engagement., , , , , and . SIGMETRICS, page 367-379. ACM, (2014)Large-Scale Measurement and Characterization of Cellular Machine-to-Machine Traffic., , , , and . IEEE/ACM Trans. Netw., 21 (6): 1960-1973 (2013)LocWeb2018 Chairs' Welcome & Organization., , , , and . WWW (Companion Volume), page 1188-1189. ACM, (2018)A semantics aware approach to automated reverse engineering unknown protocols., , , , , , , , and . ICNP, page 1-10. IEEE Computer Society, (2012)Characterizing geospatial dynamics of application usage in a 3G cellular data network., , , , and . INFOCOM, page 1341-1349. IEEE, (2012)