Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lightning Talk - Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis., , , , and . WWW (Companion Volume), page 1288-1289. ACM, (2019)Rippler: Delay injection for service dependency detection., , , and . INFOCOM, page 2157-2165. IEEE, (2014)An anomaly-driven reverse proxy for web applications., , , and . SAC, page 361-368. ACM, (2006)EARs in the wild: large-scale analysis of execution after redirect vulnerabilities., , , and . SAC, page 1792-1799. ACM, (2013)Message in a bottle: sailing past censorship., , and . ACSAC, page 39-48. ACM, (2013)Designing and Implementing Inter-Client Communication in the O2 Object-Oriented Database Management System., , and . ISOOMS, volume 858 of Lecture Notes in Computer Science, page 53-64. Springer, (1994)Challenges for Dynamic Analysis of iOS Applications., , , and . iNetSeC, volume 7039 of Lecture Notes in Computer Science, page 65-77. Springer, (2011)Are BGP Routers Open to Attack? An Experiment., , and . iNetSec, volume 6555 of Lecture Notes in Computer Science, page 88-103. Springer, (2010)Mobile Code Paradigms and Technologies: A Case Study., and . Mobile Agents, volume 1219 of Lecture Notes in Computer Science, page 39-49. Springer, (1997)Designing a Web of Highly-Configurable Intrusion Detection Sensors., , and . Recent Advances in Intrusion Detection, volume 2212 of Lecture Notes in Computer Science, page 69-84. Springer, (2001)