Author of the publication

Collaborative TCP sequence number inference attack: how to crack sequence number under a second.

, , and . CCS, page 593-604. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique., , , and . IEEE Symposium on Security and Privacy, page 207-222. IEEE Computer Society, (2010)Populated IP addresses: classification and applications., , and . CCS, page 329-340. ACM, (2012)Host Fingerprinting and Tracking on the Web: Privacy and Security Implications., , , , and . NDSS, The Internet Society, (2012)Spamming botnets: signatures and characteristics., , , , , and . SIGCOMM, page 171-182. ACM, (2008)Locality in Search Engine Queries and Its Implications for Caching., and . INFOCOM, page 1238-1247. IEEE Computer Society, (2002)Innocent by association: early recognition of legitimate users., , , , , , , , and . CCS, page 353-364. ACM, (2012)A case for unsupervised-learning-based spam filtering., , , , and . SIGMETRICS, page 367-368. ACM, (2010)Virtual disk based centralized management for enterprise networks., , and . INM@SIGCOMM, page 23-28. ACM, (2006)Less is More: Sparse Graph Mining with Compact Matrix Decomposition., , , and . Statistical Analysis and Data Mining, 1 (1): 6-22 (2008)SocialWatch: detection of online service abuse via large-scale social graphs., , , , , , and . AsiaCCS, page 143-148. ACM, (2013)