Author of the publication

Exploiting Network Structure for Proactive Spam Mitigation.

, , , , and . USENIX Security Symposium, USENIX Association, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Black Box Anomaly Detection: Is It Utopian?., , , , and . HotNets, ACM SIGCOMM, (2006)Assessing the Impact of Network Events with User Feedback., and . NetAI@SIGCOMM, page 74-79. ACM, (2018)Smoothing out focused demand for network resources., , , and . EC, page 245-248. ACM, (2001)Characterizing and Optimizing Cellular Network Performance During Crowded Events., , , , , and . IEEE/ACM Trans. Netw., 24 (3): 1308-1321 (2016)Fig: Automatic Fingerprint Generation., , , , and . NDSS, The Internet Society, (2007)Limits of Learning-based Signature Generation with Adversaries., , and . NDSS, The Internet Society, (2008)Characterizing data usage patterns in a large cellular network., , , , , , , , and . CellNet@SIGCOMM, page 7-12. ACM, (2012)Understanding the complexity of 3G UMTS network performance., , , , , , , , and . Networking, page 1-9. IEEE Computer Society, (2013)Efficient Solution Algorithms for Factored MDPs., , , and . J. Artif. Intell. Res., (2003)Large-scale app-based reporting of customer problems in cellular networks: potential and limitations., , , , , , , , and . W-MUST@SIGCOMM, page 13-18. ACM, (2011)