Author of the publication

Stylometric Anonymity: Is Imitation the Best Strategy?

, and . TrustCom/BigDataSE/ISPA (1), page 974-982. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Trust and Reputation System for IoT Service Interactions., , and . IEEE Trans. Netw. Serv. Manag., 19 (3): 2987-3005 (2022)Grid-Controlled Lightpaths for High Performance Grid Applications., , , , and . J. Grid Comput., 1 (4): 387-394 (2003)Lexical URL analysis for discriminating phishing and legitimate websites., , and . CEAS, page 109-115. ACM, (2011)A study of feature subset evaluators and feature subset searching methods for phishing classification., , and . CEAS, page 135-144. ACM, (2011)A Slightly-modified GI-based Author-verifier with Lots of Features (ASGALF)., and . CLEF (Working Notes), volume 1180 of CEUR Workshop Proceedings, page 977-983. CEUR-WS.org, (2014)Service admission control in multi-service sensor networks., and . ISCC, page 926-931. IEEE Computer Society, (2009)Performance Evaluation of a Distributed Call Admission Control for QoS-Sensitive Wireless Mobile Networks., and . ISCC, page 540-545. IEEE Computer Society, (2001)Tariff-Based Pricing and Admission Control for DiffServ Networks., , and . Integrated Network Management, volume 246 of IFIP Conference Proceedings, page 73-86. Kluwer, (2003)A multi-sensor surveillance system for elderly care., , and . Healthcom, page 502-506. IEEE, (2013)Prevention of collisions among two Wireless Personal Area Networks., , and . WMNC, page 1-7. IEEE, (2014)