Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Debugging Malware Classification Models Based on Event Logs with Explainable AI., , , , , , and . ICDM (Workshops), page 939-948. IEEE, (2023)Discriminant malware distance learning on structuralinformation for automated malware classification., and . SIGMETRICS, page 347-348. ACM, (2013)BigBing: Privacy-Preserving Cloud-Based Malware Classification Service., , , and . PAC, page 43-54. IEEE, (2018)DDoS Mitigation in Non-cooperative Environments., and . Networking, volume 4982 of Lecture Notes in Computer Science, page 599-611. Springer, (2008)SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection., , and . RAID, volume 5758 of Lecture Notes in Computer Science, page 202-223. Springer, (2009)A correlation attack against user mobility privacy in a large-scale WLAN network., , , and . S3@MobiCom, page 33-36. ACM, (2010)Detecting Selfish Exploitation of Carrier Sensing in 802.11 Networks., , , and . INFOCOM, page 657-665. IEEE, (2009)Geography-based analysis of the Internet infrastructure., , and . INFOCOM, page 131-135. IEEE, (2011)ExploitMeter: Combining Fuzzing with Machine Learning for Automated Evaluation of Software Exploitability., , , and . PAC, page 164-175. IEEE, (2017)Simulation of Network Traffic at Coarse Timescales., and . PADS, page 141-150. IEEE Computer Society, (2005)