From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

White Mirror: Leaking Sensitive Information from Interactive Netflix Movies using Encrypted Traffic Analysis., , , , и . SIGCOMM Posters and Demos, стр. 122-124. ACM, (2019)Snoopy: A Webpage Fingerprinting Framework with Finite Query Model for Mass-Surveillance., , , , и . CoRR, (2022)ApproxBC: Blockchain Design Alternatives for Approximation-Tolerant Resource-Constrained Applications., , , , и . IEEE Communications Standards Magazine, 2 (3): 45-51 (2018)Depending on HTTP/2 for Privacy? Good Luck!. DSN (Supplements), стр. 67-68. IEEE, (2020)Depending on HTTP/2 for Privacy? Good Luck!, , , , и . DSN, стр. 278-285. IEEE, (2020)Towards Measuring Quality of Service in Untrusted Multi-Vendor Service Function Chains: Balancing Security and Resource Consumption., , , , , и . INFOCOM, стр. 163-171. IEEE, (2019)ICS-Sniper: A Targeted Blackhole Attack on Encrypted ICS Traffic., , , , и . CoRR, (2023)Systematically Assessing the Security Risks of AI/ML-enabled Connected Healthcare Systems., , , , и . CoRR, (2024)Snoopy: A Webpage Fingerprinting Framework With Finite Query Model for Mass-Surveillance., , , , и . IEEE Trans. Dependable Secur. Comput., 20 (5): 3734-3752 (сентября 2023)