From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Just awful enough: the functional dysfunction of the something awful forums., , , и . CHI, стр. 2407-2410. ACM, (2014)Dawn of the Dead Domain: Measuring the Exploitation of Residual Trust in Domains., , , , , и . IEEE Secur. Priv., 15 (2): 70-77 (2017)Connected Colors: Unveiling the Structure of Criminal Networks., , , и . RAID, том 8145 из Lecture Notes in Computer Science, стр. 390-410. Springer, (2013)Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains., , , , , и . IEEE Symposium on Security and Privacy, стр. 691-706. IEEE Computer Society, (2016)Understanding the Privacy Implications of ECS - (Extended Abstract)., , , , и . DIMVA, том 9721 из Lecture Notes in Computer Science, стр. 343-353. Springer, (2016)Still Beheading Hydras: Botnet Takedowns Then and Now., , и . IEEE Trans. Dependable Secur. Comput., 14 (5): 535-549 (2017)Understanding the prevalence and use of alternative plans in malware with network games., , , и . ACSAC, стр. 1-10. ACM, (2011)Automated remote repair for mobile malware., , и . ACSAC, стр. 413-422. ACM, (2011)Beheading hydras: performing effective botnet takedowns., , , , и . ACM Conference on Computer and Communications Security, стр. 121-132. ACM, (2013)Towards designing effective visualizations for DNS-based network threat analysis., , и . VizSEC, стр. 1-8. IEEE Computer Society, (2017)