From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs., , , , , и . EuroS&P, стр. 579-594. IEEE, (2017)Collectively exercising the right of access: individual effort, societal effect., , и . Internet Policy Rev., (2018)Easier Said Than Done: The Failure of Top-Level Cybersecurity Advice for Consumer IoT Devices., , , и . CoRR, (2023)Tough Decisions? Supporting System Classification According to the AI Act., , , , , , и . JURIX, том 379 из Frontiers in Artificial Intelligence and Applications, стр. 353-358. IOS Press, (2023)Finding Harmony in the Noise: Blending Security Alerts for Attack Detection., , , , , , , , и . SAC, стр. 1385-1394. ACM, (2024)Disposable botnets: examining the anatomy of IoT botnet infrastructure., , , , , , , и . ARES, стр. 7:1-7:10. ACM, (2020)Ruling the Rules: Quantifying the Evolution of Rulesets, Alerts and Incidents in Network Intrusion Detection., , и . AsiaCCS, стр. 799-814. ACM, (2022)Internet Measurements and Public Policy: Mind the Gap., , и . CSET, USENIX Association, (2013)Two Sides of the Shield: Understanding Protective DNS adoption factors., , , , и . USENIX Security Symposium, стр. 3135-3152. USENIX Association, (2023)The Role of Internet Service Providers in Botnet Mitigation: An Empirical Analysis Based on Spam Data., , , , и . WEIS, (2010)