Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mapping Emerging News Networks: A Case Study of the San Francisco Bay Area., , , and . CompleNet, volume 424 of Studies in Computational Intelligence, page 237-244. Springer, (2012)Graph Based Induction of unresponsive routers in Internet topologies., , and . Comput. Networks, (2015)How to Find Hidden Users: A Survey of Attacks on Anonymity Networks., , and . IEEE Commun. Surv. Tutorials, 17 (4): 2296-2316 (2015)An analysis of friend circles of Facebook users., , and . LCN Workshops, page 680-686. IEEE Computer Society, (2015)Network Analysis of Software Repositories: Identifying Subject Matter Experts., , and . CompleNet, volume 424 of Studies in Computational Intelligence, page 187-198. Springer, (2012)Network management game., , and . LANMAN, page 1-6. IEEE, (2011)Analysis of academic ties: A case study of Mathematics Genealogy., , and . GLOBECOM Workshops, page 125-129. IEEE, (2011)Resolving Anonymous Routers in Internet Topology Measurement Studies., and . INFOCOM, page 1076-1084. IEEE, (2008)IoT Traffic Flow Identification using Locality Sensitive Hashes., and . ICC, page 1-6. IEEE, (2020)Operating system fingerprinting via automated network traffic analysis., , and . CEC, page 2502-2509. IEEE, (2017)