From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool's Monitoring System., , , и . USENIX Security Symposium, стр. 6151-6166. USENIX Association, (2023)SVLAN: Secure & Scalable Network Virtualization., , , и . NDSS, The Internet Society, (2020)PsyBoG: Power spectral density analysis for detecting botnet groups., , , , и . MALWARE, стр. 85-92. IEEE Computer Society, (2014)SpeedCam: Towards Efficient Flow Monitoring for Multipath Communication., , и . IM, стр. 860-865. IEEE, (2021)Analysis of NTP pool monitoring system based on multiple monitoring stations., , и . MobiHoc, стр. 259-264. ACM, (2022)Mondrian: Comprehensive Inter-domain Network Zoning Architecture., , , и . NDSS, The Internet Society, (2021)Carbon-Aware Global Routing in Path-Aware Networks., , , и . e-Energy, стр. 144-158. ACM, (2023)Hidden Bot Detection by Tracing Non-human Generated Traffic at the Zombie Host., , и . ISPEC, том 6672 из Lecture Notes in Computer Science, стр. 343-361. Springer, (2011)DroidGraph: discovering Android malware by analyzing semantic behavior., , , и . CNS, стр. 498-499. IEEE, (2014)Creating a Secure Underlay for the Internet., , , , , , , , и . USENIX Security Symposium, стр. 2601-2618. USENIX Association, (2022)