Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How to Find Hidden Users: A Survey of Attacks on Anonymity Networks., , and . IEEE Commun. Surv. Tutorials, 17 (4): 2296-2316 (2015)An analysis of friend circles of Facebook users., , and . LCN Workshops, page 680-686. IEEE Computer Society, (2015)IoT Traffic Flow Identification using Locality Sensitive Hashes., and . ICC, page 1-6. IEEE, (2020)Operating system fingerprinting via automated network traffic analysis., , and . CEC, page 2502-2509. IEEE, (2017)ATMOS - A Data Collection and Presentation Toolkit for the Nevada Climate Change Portal., , and . ICSOFT, page 206-213. SciTePress, (2013)Network Analysis of Software Repositories: Identifying Subject Matter Experts., , and . CompleNet, volume 424 of Studies in Computational Intelligence, page 187-198. Springer, (2012)POSN: A privacy preserving decentralized social network app for mobile devices., , and . ASONAM, page 1426-1429. IEEE Computer Society, (2016)Latency Comparison of Cloud Datacenters and Edge Servers., , and . GLOBECOM, page 1-6. IEEE, (2020)Open Cyber-Architecture for electrical energy markets., , , , , , and . LCN, page 1024-1031. IEEE Computer Society, (2010)Fast graph approaches to measure influenza transmission across geographically distributed host types., , , and . BCB, page 594-601. ACM, (2010)