From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Systematic Empirical Analysis of Unwanted Software Abuse, Prevalence, Distribution, and Economics.. Technical University of Madrid, Spain, (2019)CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden Services., , и . CCS, стр. 1455-1466. ACM, (2015)Mind Your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises., , , и . NDSS, The Internet Society, (2019)Coming of Age: A Longitudinal Study of TLS Deployment., , , , , и . Internet Measurement Conference, стр. 415-428. ACM, (2018)How Did That Get In My Phone? Unwanted App Distribution on Android Devices., , и . SP, стр. 53-69. IEEE, (2021)Costly freeware: a systematic analysis of abuse in download portals., , , и . IET Inf. Secur., 13 (1): 27-35 (2019)A specification-based intrusion detection engine for infrastructure-less networks., , , и . Comput. Commun., (2014)Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services., , и . USENIX Security Symposium, стр. 739-756. USENIX Association, (2016)A Lustrum of Malware Network Communication: Evolution and Insights., , , , и . IEEE Symposium on Security and Privacy, стр. 788-804. IEEE Computer Society, (2017)Can I Opt Out Yet?: GDPR and the Global Illusion of Cookie Control., , , , , , и . AsiaCCS, стр. 340-351. ACM, (2019)