Author of the publication

Zombie Awakening: Stealthy Hijacking of Active Domains through DNS Hosting Referral.

, , , , , and . ACM Conference on Computer and Communications Security, page 1307-1322. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An approach for adaptive associative classification., , , and . Expert Syst. Appl., 38 (9): 11873-11883 (2011)Granular Computing-based Qualitative Criterion Cluster and the License Plate Characters' Recognition., , and . GrC, page 602-605. IEEE, (2008)Improved layered space time architecture over quasi-static fading channels with unequal power allocation and multistage decoding., and . CCECE, page 630-634. IEEE, (2009)A Framework for Systematic Analysis of Open Access Journals and its Application in Software Engineering and Information Systems., , and . CoRR, (2013)An improved feature fusion algorithm for image retrieval., , and . CISP-BMEI, page 384-389. IEEE, (2016)Comparing Apples with Oranges? The Perceived Differences between Agile and Lean Software Development Processes., and . ICIS, Association for Information Systems, (2011)Understanding agility in software development through a complex adaptive systems perspective., and . ECIS, page 2182-2193. (2009)Key Challenges in Early-Stage Software Startups., , , and . XP, volume 212 of Lecture Notes in Business Information Processing, page 52-63. Springer, (2015)Self-organized Learning in Software Factory: Experiences and Lessons Learned., , , , and . XP, volume 179 of Lecture Notes in Business Information Processing, page 126-142. Springer, (2014)Choosing blindly but wisely: differentially private solicitation of DNA datasets for disease marker discovery., , , , and . JAMIA, 22 (1): 100-108 (2015)