From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detecting malware with graph-based methods: traffic classification, botnets, and facebook scams.. WWW (Companion Volume), стр. 495-496. International World Wide Web Conferences Steering Committee / ACM, (2013)Is P2P dying or just hiding?, , , , и . Proceedings of the GLOBECOM 2004 Conference, Dallas, Texas, IEEE Computer Society Press, (ноября 2004)Sampling Internet Topologies: How Small Can We Go?, , , и . International Conference on Internet Computing, стр. 577-580. CSREA Press, (2003)An Empirical Study of Malicious Threads in Security Forums., , , и . WWW (Companion Volume), стр. 176-182. ACM, (2019)Which phone will you get next: Observing trends and predicting the choice., , , , , и . NOMS, стр. 1-7. IEEE, (2014)Link Positions Matter: A Noncommutative Routing Metric for Wireless Mesh Network., , , , и . INFOCOM, стр. 744-752. IEEE, (2008)Inferring cellular user demographic information using homophily on call graphs., , и . INFOCOM, стр. 3363-3368. IEEE, (2013)On the usage patterns of multimodal communication: Countries and evolution., , и . INFOCOM, стр. 3135-3140. IEEE, (2013)BIVTECI: a bibliographic visualization tool., , , и . CASCON, стр. 28. IBM, (1996)Virus Propagation on Time-Varying Networks: Theory and Immunization Algorithms., , , , и . ECML/PKDD (3), том 6323 из Lecture Notes in Computer Science, стр. 99-114. Springer, (2010)