Author of the publication

A Market in Dream: the Rapid Development of Anonymous Cybercrime.

, , , , and . Mob. Networks Appl., 25 (1): 259-270 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Theoretical and Experimental Studies of Localization Methodology for AE and Microseismic Sources Without Pre-Measured Wave Velocity in Mines., , , and . IEEE Access, (2017)An Alternative Method of Backward Fuzzy Interpolation based on Areas of Fuzzy Sets., , and . ICCI*CC, page 72-77. IEEE, (2021)Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search., , , , , , , , , and 2 other author(s). IEEE Symposium on Security and Privacy, page 707-723. IEEE Computer Society, (2016)Scenario reduction-based simulation method for efficient serviceability assessment of earthquake-damaged water distribution systems., , , , and . Reliab. Eng. Syst. Saf., (2024)Towards lightweight excavation: Machine learning exploration of rock size distribution prediction after tunnel blasting., , and . J. Comput. Sci., (2024)Enhancing the performance of tunnel water inflow prediction using Random Forest optimized by Grey Wolf Optimizer., , , , , , and . Earth Sci. Informatics, 16 (3): 2405-2420 (September 2023)Nonlinear energy harvesting based alternate cooperative nonorthogonal multiple access with adaptive interference cancellation., , , , , and . Comput. Networks, (2024)Mingling of Clear and Muddy Water: Understanding and Detecting Semantic Confusion in Blackhat SEO., , , , , , and . ESORICS (1), volume 12972 of Lecture Notes in Computer Science, page 263-284. Springer, (2021)A Market in Dream: the Rapid Development of Anonymous Cybercrime., , , , and . Mob. Networks Appl., 25 (1): 259-270 (2020)TL;DR Hazard: A Comprehensive Study of Levelsquatting Scams., , , , , , , , , and 3 other author(s). SecureComm (2), volume 305 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 3-25. Springer, (2019)