From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients., , , и . ICCCN, стр. 1-6. IEEE, (2011)Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis., , , , и . ACSAC, стр. 129-138. ACM, (2012)Understanding fraudulent activities in online ad exchanges., , , , , и . Internet Measurement Conference, стр. 279-294. ACM, (2011)Towards Detecting Compromised Accounts on Social Networks., , , и . CoRR, (2015)CLAPP: characterizing loops in Android applications., , , , и . ESEC/SIGSOFT FSE, стр. 687-697. ACM, (2015)Practical Attacks against the I2P Network., , , и . RAID, том 8145 из Lecture Notes in Computer Science, стр. 432-451. Springer, (2013)Escape from Monkey Island: Evading High-Interaction Honeyclients., , , и . DIMVA, том 6739 из Lecture Notes in Computer Science, стр. 124-143. Springer, (2011)Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis., , , , и . WWW, стр. 3108-3115. ACM, (2019)VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges., , , , , и . DIMVA, том 5137 из Lecture Notes in Computer Science, стр. 44-63. Springer, (2008)Toward the Analysis of Embedded Firmware through Automated Re-hosting., , , , , , , , , и 1 other автор(ы). RAID, стр. 135-150. USENIX Association, (2019)