From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Populated IP addresses: classification and applications., , и . CCS, стр. 329-340. ACM, (2012)Host Fingerprinting and Tracking on the Web: Privacy and Security Implications., , , , и . NDSS, The Internet Society, (2012)Spamming botnets: signatures and characteristics., , , , , и . SIGCOMM, стр. 171-182. ACM, (2008)Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique., , , и . IEEE Symposium on Security and Privacy, стр. 207-222. IEEE Computer Society, (2010)Locality in Search Engine Queries and Its Implications for Caching., и . INFOCOM, стр. 1238-1247. IEEE Computer Society, (2002)Less is More: Sparse Graph Mining with Compact Matrix Decomposition., , , и . Statistical Analysis and Data Mining, 1 (1): 6-22 (2008)Virtual disk based centralized management for enterprise networks., , и . INM@SIGCOMM, стр. 23-28. ACM, (2006)A case for unsupervised-learning-based spam filtering., , , , и . SIGMETRICS, стр. 367-368. ACM, (2010)Innocent by association: early recognition of legitimate users., , , , , , , , и . CCS, стр. 353-364. ACM, (2012)How user behavior is related to social affinity., , и . WSDM, стр. 713-722. ACM, (2012)