From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Securing Named Data Networks: Challenges and the Way Forward., и . SACMAT, стр. 51-59. ACM, (2018)Compromised or Attacker-Owned: A Large Scale Classification and Study of Hosting Domains of Malicious URLs., , , , , и . USENIX Security Symposium, стр. 3721-3738. USENIX Association, (2021)Towards privacy preserving access control in the cloud., , , и . CollaborateCom, стр. 172-180. ICST / IEEE, (2011)A Domain is only as Good as its Buddies: Detecting Stealthy Malicious Domains via Graph Inference., , , и . CODASPY, стр. 330-341. ACM, (2018)Killing Two Birds with One Stone: Malicious Domain Detection with High Accuracy and Coverage., , , и . CoRR, (2017)Identifying and Characterizing COVID-19 Themed Malicious Domain Campaigns., , , , и . CODASPY, стр. 209-220. ACM, (2021)GREENER: Graph Neural Networks for News Media Profiling., , , , и . EMNLP, стр. 7470-7480. Association for Computational Linguistics, (2022)Efficient privacy preserving content based publish subscribe systems., , и . SACMAT, стр. 133-144. ACM, (2012)A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs., , , , , и . SIGMETRICS/Performance (Abstracts), стр. 55-56. ACM, (2024)Privacy preserving access control for third-party data management systems. Purdue University, USA, (2012)