Author of the publication

Attribute Inference Attacks in Online Multiplayer Video Games: A Case Study on DOTA2.

, , , and . CODASPY, page 27-38. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment., , and . IEEE Trans. Inf. Forensics Secur., 8 (6): 1027-1037 (2013)SYN-Guard: An effective counter for SYN flooding attack in software-defined networking., , , and . Int. J. Commun. Syst., (2019)ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN., , , , , and . Int. J. Inf. Sec., 20 (3): 269-285 (2021)Skype & Type: Keyboard Eavesdropping in Voice-over-IP., , , , and . ACM Trans. Priv. Secur., 22 (4): 24:1-24:34 (2019)ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks., , and . Ad Hoc Networks, 5 (1): 49-62 (2007)SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks., , and . IEEE Trans. Network and Service Management, 14 (2): 487-497 (2017)Mobility-aware cross-layer routing for peer-to-peer networks., , , and . Comput. Electr. Eng., (2019)Distributed Detection of Clone Attacks in Wireless Sensor Networks., , , and . IEEE Trans. Dependable Secur. Comput., 8 (5): 685-698 (2011)A Survey of Man In The Middle Attacks., , and . IEEE Commun. Surv. Tutorials, 18 (3): 2027-2051 (2016)Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey., and . IEEE Commun. Surv. Tutorials, 21 (3): 2831-2848 (2019)