Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TL;DR Hazard: A Comprehensive Study of Levelsquatting Scams., , , , , , , , , and 3 other author(s). SecureComm (2), volume 305 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 3-25. Springer, (2019)Sliding Mode Control for a Surgical Teleoperation System via a Disturbance Observer., , and . IEEE Access, (2019)Using Trust for Restricted Delegation in Grid Environments., , , and . ISPEC, volume 3439 of Lecture Notes in Computer Science, page 293-301. Springer, (2005)Higher Order Support Vector Random Fields for Hyperspectral Image Classification., , , and . ISPRS Int. J. Geo Inf., 7 (1): 19 (2018)Efficient and Density-Aware Routing for Wireless Sensor Networks., , , and . ICCCN, page 207-212. IEEE, (2006)Joint Relay Selection and Resource Allocation for Delay-Sensitive Traffic in Multi-Hop Relay Networks., , , and . KSII Trans. Internet Inf. Syst., 16 (9): 3008-3028 (2022)Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks., , , , , , , , , and 1 other author(s). CoRR, (2020)Imputation of Missing Values in Training Data using Variational Autoencoder., and . ICDEW, page 49-54. IEEE, (2023)MassJoin: A mapreduce-based method for scalable string similarity joins., , , , and . ICDE, page 340-351. IEEE Computer Society, (2014)CDN Judo: Breaking the CDN DoS Protection with Itself., , , , , , , , and . NDSS, The Internet Society, (2020)