From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Environment-Sensitive Intrusion Detection., , , , и . RAID, том 3858 из Lecture Notes in Computer Science, стр. 185-206. Springer, (2005)Understanding the Privacy Implications of ECS - (Extended Abstract)., , , , и . DIMVA, том 9721 из Lecture Notes in Computer Science, стр. 343-353. Springer, (2016)Protecting Secret Data from Insider Attacks., , и . Financial Cryptography, том 3570 из Lecture Notes in Computer Science, стр. 16-30. Springer, (2005)Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries., , , , и . ACM Conference on Computer and Communications Security, стр. 211-222. ACM, (2008)Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains., , , , , и . IEEE Symposium on Security and Privacy, стр. 691-706. IEEE Computer Society, (2016)Beheading hydras: performing effective botnet takedowns., , , , и . ACM Conference on Computer and Communications Security, стр. 121-132. ACM, (2013)SinkMiner: Mining Botnet Sinkholes for Fun and Profit., , , и . LEET, USENIX Association, (2013)Recursive DNS Architectures and Vulnerability Implications., , , , , и . NDSS, The Internet Society, (2009)Modeling Botnet Propagation Using Time Zones., , и . NDSS, The Internet Society, (2006)A Centralized Monitoring Infrastructure for Improving DNS Security., , , , , и . RAID, том 6307 из Lecture Notes in Computer Science, стр. 18-37. Springer, (2010)