Author of the publication

On Collecting Onion Server Fingerprints and Identification of Their Operators.

, , , and . QRS Companion, page 540-548. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Histogram and GLCM-based Approach for Image Copy-Move Forgery Detection., and . J. Inf. Process., (2019)Copy-Move Forgery Detection: A State-of-the-Art Technical Review and Analysis., and . IEEE Access, (2019)An Automatic Parallelizing Compiler MIRAI with Data Distribution Function and its Runtime Support System Fagus for Distributed Memory Architecture., , , , and . PDPTA, page 1451-1457. CSREA Press, (2002)Design and Implementation of the Loop Restructuring Feature for the MIRAI Parallelizing Complier., , , , and . PDPTA, page 1134-1140. CSREA Press, (2003)Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private CA., , , , and . Secur. Commun. Networks, (2021)An Extended Benchmark System of Word Embedding Methods for Vulnerability Detection., , and . ICFNDS, page 54:1-54:8. ACM, (2020)IP Multicast Video Broadcasting System with User Authentication., , , and . ICME, page 1186-1189. IEEE Computer Society, (2005)Development of Intellectual Network Forensic System LIFT against Targeted Attacks., , , , , , , and . CyberSec, page 16-21. IEEE Computer Society, (2015)A Turing Machine-Based Model for Computer Forensic Reconstruction., , and . SSIRI, page 289-290. IEEE Computer Society, (2009)An Agent-Based Approach to Evaluation of Workflow Support Systems., , , , , , and . C5, page 51-55. IEEE Computer Society, (2010)