From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

IoT-KEEPER: Detecting Malicious IoT Network Activity Using Online Traffic Analysis at the Edge., , , и . IEEE Trans. Netw. Serv. Manag., 17 (1): 45-59 (2020)Domain Isolation in a Multi-tenant Software-Defined Network., , и . UCC, стр. 16-25. IEEE Computer Society, (2015)Protecting IoT-environments against Traffic Analysis Attacks with Traffic Morphing., , и . PerCom Workshops, стр. 196-201. IEEE, (2019)Analysis of Topology Poisoning Attacks in Software-Defined Networking., , и . NordSec, том 11875 из Lecture Notes in Computer Science, стр. 87-102. Springer, (2019)IoT-KEEPER: Securing IoT Communications in Edge Networks., , , и . CoRR, (2018)Poster: IoTURVA: Securing Device-to-Device Communications for IoT., , , и . MobiCom, стр. 552-554. ACM, (2017)Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer., , , , и . USENIX Security Symposium, стр. 1511-1525. USENIX Association, (2018)Pitfalls of open architecture: How friends can exploit your cryptocurrency wallet., , , и . EuroSec@EuroSys, стр. 3:1-3:6. ACM, (2019)Client-Side Vulnerabilities in Commercial VPNs., , , и . NordSec, том 11875 из Lecture Notes in Computer Science, стр. 103-119. Springer, (2019)XBF: Scaling up Bloom-filter-based Source Routing., , , и . CoRR, (2016)