From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detecting malware with graph-based methods: traffic classification, botnets, and facebook scams.. WWW (Companion Volume), стр. 495-496. International World Wide Web Conferences Steering Committee / ACM, (2013)BIVTECI: a bibliographic visualization tool., , , и . CASCON, стр. 28. IBM, (1996)Which phone will you get next: Observing trends and predicting the choice., , , , , и . NOMS, стр. 1-7. IEEE, (2014)TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks., , и . ICNP, стр. 75-84. IEEE Computer Society, (2006)Network-level characteristics of spamming: An empirical analysis., , и . ICNP, стр. 25-30. IEEE Computer Society, (2011)Virus Propagation on Time-Varying Networks: Theory and Immunization Algorithms., , , , и . ECML/PKDD (3), том 6323 из Lecture Notes in Computer Science, стр. 99-114. Springer, (2010)TrueView: Harnessing the Power of Multiple Review Sites., , , , и . WWW, стр. 787-797. ACM, (2015)IDAPro for IoT Malware analysis?, , , , и . CSET @ USENIX Security Symposium, USENIX Association, (2019)Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi Arabia., , и . FOCI @ USENIX Security Symposium, USENIX Association, (2020)QoSMIC: Quality of Service Sensitive Multicast Internet Protocol., , и . SIGCOMM, стр. 144-153. ACM, (1998)