From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the feasibility of exploiting P2P systems to launch DDoS attacks., , и . Peer-to-Peer Netw. Appl., 3 (1): 36-51 (2010)Nazca: Detecting Malware Distribution in Large-Scale Networks., , , , , , , и . NDSS, The Internet Society, (2014)Enabling Confidentiality of Data Delivery in an Overlay Broadcasting System., , , , и . INFOCOM, стр. 607-615. IEEE, (2007)Detecting malicious clients in ISP networks using HTTP connectivity graph and flow information., , , , , , и . ASONAM, стр. 150-157. IEEE Computer Society, (2014)Approximate matching of persistent LExicon using search-engines for classifying Mobile app traffic., , и . INFOCOM, стр. 1-9. IEEE, (2016)Leveraging client-side DNS failure patterns to identify malicious behaviors., , , , , , и . CNS, стр. 406-414. IEEE, (2015)YouTube everywhere: impact of device and infrastructure synergies on user experience., , , , и . Internet Measurement Conference, стр. 345-360. ACM, (2011)Characterization of community based-P2P systems and implications for traffic localization., , , и . Peer-to-Peer Netw. Appl., 6 (2): 118-133 (2013)MAPPER: A Mobile Application Personal Policy Enforcement Router for Enterprise Networks., , , , , , , и . EWSDN, стр. 131-132. IEEE Computer Society, (2014)Per-user policy enforcement on mobile apps through network functions virtualization., , , , , , , и . MobiArch, стр. 37-42. ACM, (2014)