From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Private Over-Threshold Aggregation Protocols over Distributed Datasets., , , и . IEEE Trans. Knowl. Data Eng., 28 (9): 2467-2479 (2016)Measuring and Analyzing Trends in Recent Distributed Denial of Service Attacks., , , и . WISA, том 10144 из Lecture Notes in Computer Science, стр. 15-28. (2016)Examining the Security of DDoS Detection Systems in Software Defined Networks., , , и . CoNEXT Companion, стр. 49-50. ACM, (2019)Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph., , , , и . CoRR, (2016)AMAL: High-Fidelity, Behavior-Based Automated Malware Analysis and Classification., и . WISA, том 8909 из Lecture Notes in Computer Science, стр. 107-121. Springer, (2014)ADAM: Automated Detection and Attribution of Malicious Webpages., , , , и . WISA, том 8909 из Lecture Notes in Computer Science, стр. 3-16. Springer, (2014)A Private Walk in the Clouds: Using End-to-End Encryption between Cloud Applications in a Personal Domain., , и . TrustBus, том 8647 из Lecture Notes in Computer Science, стр. 72-82. Springer, (2014)Distributed and reliable decision-making for cloud-enabled mobile service platforms., и . IJDSN, (2017)Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets., , , , , , и . DSC, стр. 1-8. IEEE, (2019)POSTER: Blind Separation of Benign and Malicious Events to Enable Accurate Malware Family Classification., , и . ACM Conference on Computer and Communications Security, стр. 1478-1480. ACM, (2014)