Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis., , , , , and . IEEE Trans. Inf. Forensics Secur., 13 (7): 1838-1853 (2018)Practical Speech Re-use Prevention in Voice-driven Services., , , , and . RAID, page 282-295. ACM, (2021)NETHCF: Enabling Line-rate and Adaptive Spoofed IP Traffic Filtering., , , , , , and . ICNP, page 1-12. IEEE, (2019)BiasHacker: Voice Command Disruption by Exploiting Speaker Biases in Automatic Speech Recognition., , , , and . WISEC, page 119-124. ACM, (2022)Bin-Carver: Automatic recovery of binary executable files., , , and . Digit. Investig., 9 (Supplement): S108-S117 (2012)Editorial: special issue on "The security, privacy, and digital forensics of mobile networks and mobile cloud"., , , and . Digit. Commun. Networks, 5 (4): 203-204 (2019)On the Privacy and Integrity Risks of Contact-Tracing Applications., , , and . CoRR, (2020)AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-De�?ned Networks, , , and . Proceedings of the 2013 ACM conference on Computer and communications security, New York, NY, USA, ACM, (2013)A Framework For Integrating Security Services into Software-Defined Networks, , , and . (2013)SysFlow: Toward a Programmable Zero Trust Framework for System Security., , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)