From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Eight Years of Rider Measurement in the Android Malware Ecosystem: Evolution and Lessons Learned., и . CoRR, (2018)Targeted Attacks against Industrial Control Systems: Is the Power Industry Prepared?, , , и . SEGS@CCS, стр. 13-22. ACM, (2014)A Qualitative Evaluation of Two Different Law Enforcement Approaches on Dark Net Markets., и . EuroS&P Workshops, стр. 453-463. IEEE, (2019)Fatal attraction: identifying mobile devices through electromagnetic emissions., , и . WiSec, стр. 163-173. ACM, (2019)Marked for Disruption: Tracing the Evolution of Malware Delivery Operations Targeted for Takedown., , , и . RAID, стр. 340-353. ACM, (2021)On the Perils of Leaking Referrers in Online Collaboration Services., , и . DIMVA, том 11543 из Lecture Notes in Computer Science, стр. 67-85. Springer, (2019)There are N Impostors Among Us: Understanding the Effect of State-Sponsored Troll Accounts on Reddit Discussions., , и . ICWSM Workshops, (2022)Understanding Web Archiving Services and Their (Mis)Use on Social Media., , , , и . ICWSM, стр. 454-464. AAAI Press, (2018)You Are Your Metadata: Identification and Obfuscation of Social Media Users Using Metadata Information., , и . ICWSM, стр. 241-250. AAAI Press, (2018)POISED: Spotting Twitter Spam Off the Beaten Paths., , , , , , , и . CCS, стр. 1159-1174. ACM, (2017)