Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting and Defending Against Certificate Attacks with Origin-Bound CAPTCHAs., , , , and . SecureComm (2), volume 255 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 291-308. Springer, (2018)Trimmer: An Automated System for Configuration-Based Software Debloating., , , , , , , , and . IEEE Trans. Software Eng., 48 (9): 3485-3505 (2022)Analyzing the Feasibility and Generalizability of Fingerprinting Internet of Things Devices., , and . Proc. Priv. Enhancing Technol., 2022 (2): 578-600 (2022)An Anomaly Detection Fabric for Clouds Based on Collaborative VM Communities., , , , and . CCGrid, page 431-441. IEEE Computer Society / ACM, (2017)It's All in the Name: Why Some URLs are More Vulnerable to Typosquatting., , , , , , and . INFOCOM, page 2618-2626. IEEE, (2018)To route or to secure: Tradeoffs in ICNs over MANETs., , , , and . NCA, page 367-374. IEEE Computer Society, (2016)CanaryTrap: Detecting Data Misuse by Third-Party Apps on Online Social Networks., , , and . Proc. Priv. Enhancing Technol., 2020 (4): 336-354 (2020)Accelerating Fourier and Number Theoretic Transforms using Tensor Cores and Warp Shuffles., , , , , , , and . PACT, page 345-355. IEEE, (2021)Covert channels in online rogue-like games., and . ICC, page 761-767. IEEE, (2014)A Classification Based Framework to Predict Viral Threads., , , , , , , and . PACIS, page 134. (2015)