Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spatial Density-based User Identity Linkage across Social Networks., , , , , , , and . IEEE Big Data, page 656-664. IEEE, (2022)Security importance assessment for system objects and malware detection., , , , and . Comput. Secur., (2017)Linking User Identities Across Social Networks via Frequency Domain Analysis., , and . IFIP Networking, page 1-8. IEEE, (2023)DCDroid: automated detection of SSL/TLS certificate verification vulnerabilities in Android apps., , , and . ACM TUR-C, page 137:1-137:9. ACM, (2019)HMGR: A Hybrid Model for Geolocation Recommendation., , , , , and . BigData, volume 14203 of Lecture Notes in Computer Science, page 48-62. Springer, (2023)Identifying Intrusion Infections via Probabilistic Inference on Bayesian Network., , , and . DIMVA, volume 9148 of Lecture Notes in Computer Science, page 307-326. Springer, (2015)Secure and Fast Query Approach for High-Precision Multi-dimensional Satellite Remote Sensing Data., , , , , , and . EDGE, volume 14205 of Lecture Notes in Computer Science, page 69-81. Springer, (2023)DNS Tunnel Detection for Low Throughput Data Exfiltration via Time-Frequency Domain Analysis., , , , , , , , , and . ICC, page 2331-2337. IEEE, (2023)Probabilistic Inference on Integrity for Access Behavior Based Malware Detection., , , and . RAID, volume 9404 of Lecture Notes in Computer Science, page 155-176. Springer, (2015)Centrality metrics of importance in access behaviors and malware detections., , , and . ACSAC, page 376-385. ACM, (2014)