From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Deanonymizing Tor hidden service users through Bitcoin transactions analysis., , , и . Comput. Secur., (2020)Design and analysis of a social botnet., , , и . Comput. Networks, 57 (2): 556-578 (2013)Source Attribution of Cryptographic API Misuse in Android Applications., , и . AsiaCCS, стр. 133-146. ACM, (2018)Dizzy: Large-Scale Crawling and Analysis of Onion Services., и . CoRR, (2022)To Befriend Or Not? A Model of Friend Request Acceptance on Facebook., , , и . SOUPS, стр. 285-300. USENIX Association, (2014)When A Small Leak Sinks A Great Ship: Deanonymizing Tor Hidden Service Users Through Bitcoin Transactions Analysis., , , и . CoRR, (2018)Understanding Users' Requirements for Data Protection in Smartphones., , , , и . ICDE Workshops, стр. 228-235. IEEE Computer Society, (2012)Harvesting the low-hanging fruits: defending against automated large-scale cyber-intrusions by focusing on the vulnerable population., , , , , и . NSPW, стр. 11-22. ACM, (2016)Key Challenges in Defending Against Malicious Socialbots., , , и . LEET, USENIX Association, (2012)Thwarting Fake OSN Accounts by Predicting their Victims., , , и . AISec@CCS, стр. 81-89. ACM, (2015)