From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Virus Propagation on Time-Varying Networks: Theory and Immunization Algorithms., , , , и . ECML/PKDD (3), том 6323 из Lecture Notes in Computer Science, стр. 99-114. Springer, (2010)TrueView: Harnessing the Power of Multiple Review Sites., , , , и . WWW, стр. 787-797. ACM, (2015)QoSMIC: Quality of Service Sensitive Multicast Internet Protocol., , и . SIGCOMM, стр. 144-153. ACM, (1998)IDAPro for IoT Malware analysis?, , , , и . CSET @ USENIX Security Symposium, USENIX Association, (2019)Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi Arabia., , и . FOCI @ USENIX Security Symposium, USENIX Association, (2020)Sampling Internet Topologies: How Small Can We Go?, , , и . International Conference on Internet Computing, стр. 577-580. CSREA Press, (2003)BIVTECI: a bibliographic visualization tool., , , и . CASCON, стр. 28. IBM, (1996)Detecting malware with graph-based methods: traffic classification, botnets, and facebook scams.. WWW (Companion Volume), стр. 495-496. International World Wide Web Conferences Steering Committee / ACM, (2013)An Empirical Study of Malicious Threads in Security Forums., , , и . WWW (Companion Volume), стр. 176-182. ACM, (2019)Which phone will you get next: Observing trends and predicting the choice., , , , , und . NOMS, Seite 1-7. IEEE, (2014)