From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis., , и . IEEE Trans. Dependable Secur. Comput., 9 (5): 714-726 (2012)Still Beheading Hydras: Botnet Takedowns Then and Now., , и . IEEE Trans. Dependable Secur. Comput., 14 (5): 535-549 (2017)Real-Time Detection of Malware Downloads via Large-Scale URL->File->Machine Graph Mining., , и . AsiaCCS, стр. 783-794. ACM, (2016)SURF: detecting and measuring search poisoning., , и . ACM Conference on Computer and Communications Security, стр. 467-476. ACM, (2011)Towards Measuring the Effectiveness of Telephony Blacklists., , , и . NDSS, The Internet Society, (2018)Network Intrusion Detection by Combining One-Class Classifiers., , и . ICIAP, том 3617 из Lecture Notes in Computer Science, стр. 58-65. Springer, (2005)VAMO: towards a fully automated malware clustering validity analysis., и . ACSAC, стр. 329-338. ACM, (2012)Understanding the prevalence and use of alternative plans in malware with network games., , , и . ACSAC, стр. 1-10. ACM, (2011)Beheading hydras: performing effective botnet takedowns., , , , и . ACM Conference on Computer and Communications Security, стр. 121-132. ACM, (2013)Detecting and Tracking the Rise of DGA-Based Malware., , , и . login Usenix Mag., (2012)