Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hidden in Plain Sight. SDP-Based Covert Channel for Botnet Communication., , , , and . TrustBus, volume 9264 of Lecture Notes in Computer Science, page 48-59. Springer, (2015)A cross-domain qualitative meta-analysis of digital forensics: Research trends, challenges, and emerging topics., , , , , , , , and . CoRR, (2021)DNS amplification attack revisited., , , , and . Comput. Secur., (2013)An Architecture for Processing a Dynamic Heterogeneous Information Network of Security Intelligence., , , , , , and . NSS, volume 13041 of Lecture Notes in Computer Science, page 185-201. Springer, (2021)Botnet Command and Control Architectures Revisited: Tor Hidden Services and Fluxing., , , , , and . WISE (2), volume 10570 of Lecture Notes in Computer Science, page 517-527. Springer, (2017)Efficient Certification Path Discovery for MANET., , , , and . EURASIP J. Wireless Comm. and Networking, (2010)Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews., , , , , , , , and . IEEE Access, (2022)Tracing Your Smart-Home Devices Conversations: A Real World IoT Traffic Data-Set., , , and . Sensors, 20 (22): 6600 (2020)Large-scale empirical evaluation of DNS and SSDP amplification attacks., , and . J. Inf. Secur. Appl., (2022)Another Step in the Ladder of DNS-Based Covert Channels: Hiding Ill-Disposed Information in DNSKEY RRs., and . Information, 10 (9): 284 (2019)