From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

When the network crumbles: an empirical study of cloud network failures and their impact on services., и . SoCC, стр. 15:1-15:17. ACM, (2013)The Dark Menace: Characterizing Network-based Attacks in the Cloud., , , и . Internet Measurement Conference, стр. 169-182. ACM, (2015)iFriendU: leveraging 3-cliques to enhance infiltration attacks in online social networks., , и . ACM Conference on Computer and Communications Security, стр. 723-725. ACM, (2010)Automated Adversarial Testing of Unmodified Wireless Routing Implementations., , , , и . IEEE/ACM Trans. Netw., 24 (6): 3369-3382 (2016)Move Fast and Meet Deadlines: Fine-grained Real-time Stream Processing with Cameo., , , , и . NSDI, стр. 389-405. USENIX Association, (2021)You unlocked the Mt. Everest badge on foursquare! Countering location fraud in Geosocial Networks., и . MASS, стр. 182-190. IEEE Computer Society, (2012)Adversarial testing of wireless routing implementations., , , , и . WISEC, стр. 143-148. ACM, (2013)Demystifying the dark side of the middle: a field study of middlebox failures in datacenters., и . Internet Measurement Conference, стр. 9-22. ACM, (2013)Generating Summary Risk Scores for Mobile Applications., , , , , , , и . IEEE Trans. Dependable Secur. Comput., 11 (3): 238-251 (2014)Omnify: Investigating the Visibility and Effectiveness of Copyright Monitors., , , и . PAM, том 6579 из Lecture Notes in Computer Science, стр. 122-132. Springer, (2011)