From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Understanding and Predicting Private Interactions in Underground Forums., , , , , и . CODASPY, стр. 303-314. ACM, (2019)An open source engineering practice assistant training system based on virtual reality., , , , и . FIE, стр. 1-4. IEEE, (2020)Scam Pandemic: How Attackers Exploit Public Fear through Phishing., , , , , , , , , и 2 other автор(ы). CoRR, (2021)Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service., , , , , , , , , и . USENIX Security Symposium, стр. 4169-4186. USENIX Association, (2021)CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing., , , , , , , , , и 3 other автор(ы). SP, стр. 1109-1124. IEEE, (2021)Migrating GIS Big Data Computing from Hadoop to Spark: An Exemplary Study Using Twitter., , , , и . CLOUD, стр. 351-358. IEEE Computer Society, (2016)A Small Range Six-Axis Accelerometer Designed with High Sensitivity DCB Elastic Element., , , и . Sensors, 16 (9): 1552 (2016)RTIDS: A Robust Transformer-Based Approach for Intrusion Detection System., , , и . IEEE Access, (2022)CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing., , , , , , , , , и 3 other автор(ы). IEEE Secur. Priv., 20 (2): 10-21 (2022)PACE Solver Description: Hust-Solver - A Heuristic Algorithm of Directed Feedback Vertex Set Problem., , , , , , , , , и 2 other автор(ы). IPEC, том 249 из LIPIcs, стр. 29:1-29:3. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)