From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Novel and Practical SDN-based Traceback Technique for Malicious Traffic over Anonymous Networks., , , , и . INFOCOM, стр. 1180-1188. IEEE, (2019)Protocol-level hidden server discovery., , , и . INFOCOM, стр. 1043-1051. IEEE, (2013)Providing service assurance in mobile opportunistic networks., , , , , и . Comput. Networks, (2014)Optimizing Aggregate Query Processing in Cloud Data Warehouses., , , , , и . Globe, том 8648 из Lecture Notes in Computer Science, стр. 1-12. Springer, (2014)On the (In)security of Bluetooth Low Energy One-Way Secure Connections Only Mode., , , , , и . CoRR, (2019)A Comprehensive and Long-term Evaluation of Tor V3 Onion Services., , , , и . INFOCOM, стр. 1-10. IEEE, (2023)Prison Break of Android Reflection Restriction and Defense., , , , , , и . INFOCOM, стр. 1-10. IEEE, (2021)HAWK: An unmanned mini helicopter-based aerial wireless kit for localization., , , , и . INFOCOM, стр. 2219-2227. IEEE, (2012)Identifying mobiles hiding behind wireless routers., , , , и . INFOCOM, стр. 2651-2659. IEEE, (2011)Theory underlying measurement of AOA with a rotating directional antenna., , , , и . INFOCOM, стр. 2490-2498. IEEE, (2013)