From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Client-Side Web Proxy Detection from Unprivileged Mobile Devices., и . CoRR, (2015)On the Free Bridge Across the Digital Divide: Assessing the Quality of Facebook's Free Basics Service., , , , , , и . Internet Measurement Conference, стр. 127-133. ACM, (2016)When IPs Fly: A Case for Redefining Airline Communication., , и . HotMobile, стр. 9-14. ACM, (2016)Network Positioning from the Edge - An Empirical Study of the Effectiveness of Network Positioning in P2P Systems., , и . INFOCOM, стр. 291-295. IEEE, (2010)Behind the Scenes: Uncovering TLS and Server Certificate Practice of IoT Device Vendors in the Wild., , , , , , , , и . IMC, стр. 457-477. ACM, (2023)In the Room Where It Happens: Characterizing Local Communication and Threats in Smart Homes., , , , , , , , , и 1 other автор(ы). IMC, стр. 437-456. ACM, (2023)SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses., , , и . EuroS&P, стр. 385-402. IEEE, (2021)ZLeaks: Passive Inference Attacks on Zigbee Based Smart Homes., , , , , и . ACNS, том 13269 из Lecture Notes in Computer Science, стр. 105-125. Springer, (2022)Towards efficient traffic-analysis resistant anonymity networks., , , , , и . SIGCOMM, стр. 303-314. ACM, (2013)Diagnosing Path Inflation of Mobile Client Traffic., , , , , , , и . PAM, том 8362 из Lecture Notes in Computer Science, стр. 23-33. Springer, (2014)