From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Classification Based Framework to Predict Viral Threads., , , , , , , и . PACIS, стр. 134. (2015)Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting., , , и . IEEE Symposium on Security and Privacy, стр. 135-150. IEEE Computer Society, (2015)Efficient relaying strategy selection and signal combining using error estimation codes., , , и . WCNC, стр. 996-1000. IEEE, (2014)An Empirical Analysis of the Commercial VPN Ecosystem., , , , , и . Internet Measurement Conference, стр. 443-456. ACM, (2018)Helping Users Automatically Find and Manage Sensitive, Expendable Files in Cloud Storage., , , , , , и . USENIX Security Symposium, стр. 1145-1162. USENIX Association, (2021)Forgotten But Not Gone: Identifying the Need for Longitudinal Data Management in Cloud Storage., , , и . CHI, стр. 543. ACM, (2018)Blind In/On-Path Attacks and Applications to VPNs., , , , и . USENIX Security Symposium, стр. 3129-3146. USENIX Association, (2021)Sneak-Peek: High speed covert channels in data center networks., , , , , , , , и . INFOCOM, стр. 1-9. IEEE, (2016)High Fidelity, High Risk, High Reward: Using High-Fidelity Networking Data in Ethically Sound Research., и . NS Ethics@SIGCOMM, стр. 23-26. ACM, (2015)Moving Beyond Set-It-And-Forget-It Privacy Settings on Social Media., , , , , , , , и . CCS, стр. 991-1008. ACM, (2019)