From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Who are you talking to? Breaching privacy in encrypted IM networks., , , и . ICNP, стр. 1-10. IEEE Computer Society, (2013)Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots., , , , и . Internet Measurement Conference, стр. 129-136. ACM, (2014)Malware Slums: Measurement and Analysis of Malware on Traffic Exchanges., , , , , и . DSN, стр. 572-582. IEEE Computer Society, (2016)A distributed and privacy preserving algorithm for identifying information hubs in social networks., , , и . INFOCOM, стр. 561-565. IEEE, (2011)A Random Walk Approach to Modeling the Dynamics of the Blogosphere., и . Networking (1), том 6640 из Lecture Notes in Computer Science, стр. 294-306. Springer, (2011)A first look at cellular machine-to-machine traffic: large scale measurement and characterization., , , , и . SIGMETRICS, стр. 65-76. ACM, (2012)Characterizing and modeling internet traffic dynamics of cellular devices., , , и . SIGMETRICS, стр. 305-316. ACM, (2011)Revisiting caching in content delivery networks., , и . SIGMETRICS, стр. 567-568. ACM, (2014)A large scale exploratory analysis of software vulnerability life cycles., , и . ICSE, стр. 771-781. IEEE Computer Society, (2012)Is news sharing on Twitter ideologically biased?, , и . CSCW, стр. 887-896. ACM, (2013)